Re: Microsoft SQL Server Agent Jobs Vulnerabilities (#NISR15002002B)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I'm not sure how you can categorize this as "human error" since the default
SQL Server installation includes the 'guest' user in master, msdb, and
tempdb databases.  This gives all logins, no matter how lowly, access to
thoses databases and objects inside that have permissions granted to the
'public' role.  I think you'll find MS has been most gracious with those
permissions.  That, and the aforementioned buffer overflows, are the crux of
the problem.

Chip Andrews
www.sqlsecurity.com

----- Original Message -----
From: "Brent Glover" <brent.glover@team.telstraclear.co.nz>
To: <bugtraq@securityfocus.com>
Sent: Sunday, August 25, 2002 5:01 PM
Subject: Re: Microsoft SQL Server Agent Jobs Vulnerabilities
(#NISR15002002B)


> In-Reply-To: <015601c244d2$fa6f8a30$2500a8c0@HEPHAESTUS>
>
> IMHO - This is more a human error driven feature than a high risk
> vulnerability.
>
> Whilst what David says is true - the assumption has been made that a login
> has access to the "msdb" database by default - this assumption is
> incorrect.
>
> The only way this vulnerability can be exploited is if a DBA (mad of
> course ;-)) has given access for a login account to the "msdb" database.
>
> Brent Glover
> Database specialist
>
>


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux