Microsoft warns of critical bug in SQL Server

Released attack code targets SQL Server database software

Microsoft Monday warned customers that attack code has been released targeting a critical vulnerability in older versions of its widely-used SQL Server database software, and urged users to apply a temporary workaround.

The bug was first reported to Microsoft last April by an Austrian security consulting company, SEC Consult. But the firm apparently grew tired of waiting for Microsoft to decide when or whether it would release a patch, disclosed the flaw two weeks ago and published proof-of-concept exploit code.

According to SEC Consult, Microsoft has had a patch ready for nearly three months, but has declined to release it.

In a security advisory issued late Monday, Microsoft said that systems running SQL Server 2000, SQL Server 2005, SQL Server 2005 Express Edition, SQL Server 2000 Desktop Engine (MSDE 2000), Microsoft SQL Server 2000 Desktop Engine (WMSDE) and Windows Internal Database (WYukon) can be exploited, then hijacked by hackers.

The bug is in the "sp_replwritetovarbin" SQL Server extended stored procedure.

Newer versions of the popular software, which is used by many Web sites to power their back-end databases, are immune from attack, however. Those versions include SQL Server 7.0 Service Pack 4 (SP4), SQL Server 2005 SP3 and SQL Server 2008. That last version, the newest in the line, was released to manufacturing just last August.

As it often does, Microsoft downplayed the threat even as it issued the advisory. "We are aware that exploit code has been published on the Internet," said a company spokesman, in an e-mail Monday. "However, we are not aware of any attacks attempting to use the reported vulnerability."

Attackers can exploit the bug remotely if they are able to gain access to the server through a SQL injection attack against a vulnerable Web application running on the system, Sisk acknowledged.

Successful SQL injection attacks are hardly rare; hackers have managed to compromise huge numbers of sites, even prominent commercial domains, using such attacks. Several thousand legitimate sites, for example, were hacked via SQL injection attacks in the last few weeks by criminals who then planted rogue code on their pages and attacked visitors running Internet Explorer (IE). Microsoft plugged the IE hole last Wednesday with the second emergency patch in a two-month span.

Microsoft said that denying permissions to the "'sp_replwritetovarbin" extended stored procedure would protect vulnerable systems, and provided instructions on how to do that in the advisory.

Sisk didn't commit the company to a fix, or a timeline for one, but the boilerplate phrasing he used — "Microsoft will continue to investigate this vulnerability and upon completion of this investigation, will take the appropriate actions" — typically leads at some point to a patch.

SEC Consult, however, claimed Microsoft completed a fix in September.

The company, which is headquartered in Vienna, went public with the vulnerability on Dec. 9 by publishing information and sample attack code in an advisory on its site, as well as to several security mailing lists, including Bugtraq and Full Disclosure .

In its disclosure, SEC Consult said it had been told by Microsoft in a September e-mail that a patch was finished. "The release schedule for this fix is currently unknown," SEC Consult's advisory read.

The Austrian security firm also included a timeline it said reflected the communications between it and Microsoft. According to that timetable, SEC Consult reported the vulnerability to Microsoft on April 17, 2008, and last heard back from Microsoft Sept 29. Four times since then — on Oct. 14, Oct. 29, Nov. 12 and Nov. 28 — SEC Consult asked Microsoft for an update on the patch release status, but received no reply.

Microsoft did not immediately respond to questions about SEC Consult's claims, including patch availability and the timeline.

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.
Gregg Keizer

Gregg Keizer

Computerworld (US)
Show Comments

Cool Tech

Toys for Boys

Family Friendly

Stocking Stuffer

SmartLens - Clip on Phone Camera Lens Set of 3

Learn more >

Christmas Gift Guide

Click for more ›

Brand Post

Most Popular Reviews

Latest Articles


PCW Evaluation Team

Aysha Strobbe

Microsoft Office 365/HP Spectre x360

Microsoft Office continues to make a student’s life that little bit easier by offering reliable, easy to use, time-saving functionality, while continuing to develop new features that further enhance what is already a formidable collection of applications

Michael Hargreaves

Microsoft Office 365/Dell XPS 15 2-in-1

I’d recommend a Dell XPS 15 2-in-1 and the new Windows 10 to anyone who needs to get serious work done (before you kick back on your couch with your favourite Netflix show.)

Maryellen Rose George

Brother PT-P750W

It’s useful for office tasks as well as pragmatic labelling of equipment and storage – just don’t get too excited and label everything in sight!

Cathy Giles

Brother MFC-L8900CDW

The Brother MFC-L8900CDW is an absolute stand out. I struggle to fault it.

Luke Hill


I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Featured Content

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?