Title: SQL Query Method Enables Cached Administrator Connection
to be Reused
Date: 12 June 2001
Software: Microsoft SQL Server 2000 and SQL Server 7.0
Impact: Privilege elevation
Bulletin: MS01-032
Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/MS01-032.asp.
When a client connection to a SQL Server is terminated, it remains
cached for a short period of time for performance reasons. One SQL
query method contains a flaw that has the effect of making it
possible for one user's query to reuse a cached connection that
belonged to the sa account.
Exploiting this vulnerability would enable an attacker to execute the
query using the administrator's security context. This would give
her the ability to take any desired action on the database;
moreover, it would give her the ability to run extended stored
procedures, thereby giving her the opportunity to run code of her
choice and assume
de facto control of the server itself.
THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS PROVIDED
"AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL,
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF
MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES
SO THE FOREGOING LIMITATION MAY NOT APPLY.