Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2018-8273

Опубликовано: 20 авг. 2018
Источник: msrc
EPSS Средний

Описание

Microsoft SQL Server Remote Code Execution Vulnerability

A buffer overflow vulnerability exists in the Microsoft SQL Server that could allow remote code execution on an affected system. An attacker who successfully exploited this vulnerability could execute code in the context of the SQL Server Database Engine service account.

To exploit the vulnerability, an attacker would need to submit a specially crafted query to an affected SQL server.

The security update addresses the vulnerability by modifying how the Microsoft SQL Server Database Engine handles objects in memory.

FAQ

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update numberTitleApply if current product version is…This security update also includes servicing releases up through…
4293803Description of the security update for the Remote Code Execution vulnerability in SQL Server 2017 (GDR): August 14, 201814.0.1000.169 - 14.0.2000.634057122
4293805Description of the security update for the Remote Code Execution vulnerability in SQL Server 2017 (CU): August 14, 201814.0.3006.16 - 14.0.3030.27KB4341265 – RTM CU9
4458842Description of the security update for the Remote Code Execution vulnerability in SQL Server 2016 SP1(GDR): August 14, 201813.0.4001.0 - 13.0.4223.104293801
4293808Description of the security update for the Remote Code Execution vulnerability in SQL Server 2016 SP1 (CU): August 14, 201813.0.4411.0 - 13.0.4514.0KB4341569 – SP1 CU10
4293802Description of the security update for the Remote Code Execution vulnerability in SQL Server 2016 SP2 (GDR): August 14, 201813.0.5026.0 - 13.0.5099.0SP2
4458621Description of the security update for the Remote Code Execution vulnerability in SQL Server 2016 SP2 (CU): August 14, 201813.0.5149.0 - 13.0.5161.0KB4293807 – SP2 CU2-GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different update servicing branches in place for SQL Server. The primary difference between the two is that CU branches cumulatively include all updates for a given baseline, while GDR branches include only cumulative critical updates for a given baseline. A baseline can be the initial RTM release or a Service Pack.

For any given baseline, either the GDR or CU updates are options if you are a) at the baseline version (never installed any servicing updates, CU or GDR), or b) have only installed GDR updates. The CU update is the only option if you have installed a previous SQL Server CU for the baseline you are on.

Does this security update apply to SQL Server 2017 on Linux or on Linux Docker Containers?

Yes. For information on obtaining and installing the CU or GDR updates on Linux Operating Systems or Docker Containers, please see:

  1. Configure repositories for installing and upgrading SQL Server on Linux
  2. Release notes for SQL Server 2017 on Linux
  3. Official images for Microsoft SQL Server on Linux for Docker Engine

Will these security updates be offered to SQL Server clusters?

Yes. The updates will also be offered to SQL Server 2016 SP1/SP2 and SQL Server 2017 RTM instances that are clustered. Updates for SQL Server clusters will require user interaction. If the SQL Server 2016 SP1/SP2 or SQL Server 2017 RTM cluster has a passive node, to reduce downtime, Microsoft recommends that you scan and apply the update to the inactive node first, then scan and apply it to the active node. When all components have been updated on all nodes, the update will no longer be offered.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.

Обновления

ПродуктСтатьяОбновление
Microsoft SQL Server 2016 for x64-based Systems Service Pack 1 (GDR)
Microsoft SQL Server 2016 for x64-based Systems Service Pack 1 (CU)
Microsoft SQL Server 2017 for x64-based Systems (GDR)
Microsoft SQL Server 2017 for x64-based Systems (CU)
Microsoft SQL Server 2016 for x64-based Systems Service Pack 2 (CU)
Microsoft SQL Server 2016 for x64-based Systems Service Pack 2 (GDR)

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

Older Software Release

Exploitation Less Likely

DOS

Permanent

EPSS

Процентиль: 96%
0.22705
Средний

Связанные уязвимости

CVSS3: 9.8
nvd
больше 7 лет назад

A buffer overflow vulnerability exists in the Microsoft SQL Server that could allow remote code execution on an affected system, aka "Microsoft SQL Server Remote Code Execution Vulnerability." This affects Microsoft SQL Server.

CVSS3: 9.8
github
почти 4 года назад

A buffer overflow vulnerability exists in the Microsoft SQL Server that could allow remote code execution on an affected system, aka "Microsoft SQL Server Remote Code Execution Vulnerability." This affects Microsoft SQL Server.

CVSS3: 8.8
fstec
больше 7 лет назад

Уязвимость системы управления базами данных SQL Server, вызванная переполнением буфера, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 96%
0.22705
Средний