Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2022-29143

Опубликовано: 14 июн. 2022
Источник: msrc
CVSS3: 7.5
EPSS Низкий

Описание

Microsoft SQL Server Remote Code Execution Vulnerability

FAQ

How could an attacker exploit this vulnerability?

An authenticated attacker could exploit the vulnerability by executing a specially crafted query using $ partition against a table with a Column Store index.

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update numberTitleApply if current product version is…This security update also includes servicing releases up through…
5014356Security update for SQL Server 2019 RTM GDR: June 14, 202215.0.2000.5 - 15.0.2080.9KB 4583458 - Previous SQL19 RTM GDR
5014353Security update for SQL Server 2019 RTM CU16: June 14, 202215.0.4003.23 - 15.0.4223.1KB 5011644 – SQL19 RTM CU16
5014354Security update for SQL Server 2017 RTM GDR: June 14, 202214.0.1000.169 - 14.0.2037.2KB4583456 - Previous SQL17 RTM GDR
5014553Security update for SQL Server 2017 RTM CU29: June 14, 202214.0.3006.16 - 14.0.3436.1KB5010786 – SQL17 RTM CU29
5014365Security update for SQL Server 2016 Service Pack 2 (GDR): June 14, 202213.0.5026.0 - 13.0.5103.6KB4583460 - Previous SQL16 SP2 GDR
5014351Security update for SQL Server 2016 Service Pack 2 CU17: June 14, 202213.0.5149.0 - 13.0.5888.11KB5001092 – SQL SP2 CU17
5014355Security update for SQL Server 2016 Service Pack 3 (GDR): June 14, 202213.0.6300.2N/A
5015371Security update for SQL Server 2016 Service Pack 3 Azure Connectivity Pack: June 14, 202213.0.7000.253N/A
5014165Security update for SQL Server 2014 Service Pack 3 (GDR): June 14, 202212.0.6024.0 - 12.0.6164.21KB4583463 - Previous SQL14 SP3 GDR
5014164Security update for SQL Server 2014 Service Pack 3 CU4: June 14, 202212.0.6205.1 - 12.0.6433.1KB4583462 – SQL14 SP3 CU4

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then choose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.

Обновления

ПродуктСтатьяОбновление
Microsoft SQL Server 2017 for x64-based Systems (GDR)
Microsoft SQL Server 2016 for x64-based Systems Service Pack 2 (GDR)
Microsoft SQL Server 2014 Service Pack 3 for x64-based Systems (GDR)
Microsoft SQL Server 2014 Service Pack 3 for 32-bit Systems (GDR)
Microsoft SQL Server 2014 Service Pack 3 for 32-bit Systems (CU 4)
Microsoft SQL Server 2019 for x64-based Systems (GDR)
Microsoft SQL Server 2014 Service Pack 3 for x64-based Systems (CU 4)
Microsoft SQL Server 2019 for x64-based Systems (CU 16)
Microsoft SQL Server 2017 for x64-based Systems (CU 29)
Microsoft SQL Server 2016 for x64-based Systems Service Pack 2 (CU 17)

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

Older Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 84%
0.02154
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
больше 3 лет назад

Microsoft SQL Server Remote Code Execution Vulnerability

CVSS3: 7.5
github
больше 3 лет назад

Microsoft SQL Server Remote Code Execution Vulnerability.

CVSS3: 7.5
fstec
почти 4 года назад

Уязвимость системы управления реляционными базами данных Microsoft SQL Server, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 84%
0.02154
Низкий

7.5 High

CVSS3