MSSQL2K
ORACLE8i
1. A vulnerability has been discovered in Microsoft SQL Server that could make it possible for remote attackers to gain access to target hosts.

It is possible for an attacker to cause a buffer overflow condition on the vulnerable SQL server with a malformed login request. This may allow a remote attacker to execute arbitrary code as the SQL Server process.

This vulnerability reportedly occurs even before authentication can proceed.
http://www.securityfocus.com/bid/5411/discussion/
http://otn.oracle.com/deploy/security/pdf/net9_dos_alert.pdf

(они правда почему-то говорят, что это только ДОС-атака :))
A buffer overflow exists that allows an anonymous attacker to execute arbitrary shell commands under the security context of the listener service. In the first packet sent to an Oracle listener, a connection string is sent which describes the database to which to connect and includes optional commands. Within the connection string is a field called SERVICE_NAME. When the SERVICE_NAME is 8000 bytes or longer, a buffer overflow occurs in the listener service.

Platforms affected
MS Windows and VM only.
(Note: Unix, VMS, OS/390 are not affected)
----------
да у microsoft с безопасностью фигово, именно это я в принципе и доказываю, у unix таких проблем нет.


http://www.oracle.com/technology/deploy/security/pdf/2003alert57.pdf

Utilizing an Oracle Listener configured with a TCP protocol address, a knowledgeable and malicious user can write
an exploit that connects to an Oracle Database server’s EXTPROC OS process without having to provide a
database username and password. As such, it is possible to make arbitrary calls to the underlying OS and
potentially gain unauthorized administrative access to the machine hosting the Oracle Database server. The
EXTPROC functionality is installed by default in the Oracle Database installation if the “Typical Installation” option
is chosen from the Oracle Universal Installer menu. EXTPROC is used by Oracle’s PL/SQL software to make calls
to the operating system.

-------
ЗАЧЕТ: я только еще посмотрю долже ли он быть сначала сконфигурен перед тем как его можно поломать.

P.S. http://www.oracle.com/technology/deploy/security/pdf/2004alert68.pdf
это 10ка.

2. There is an inconsistency between the interface definitions in certain RPC server stubs and the remote server's input validation code.

If certain input is validated by the interface definition, there is a chance that the target server will not properly validate the input. Thus, possibly impacting the server's performance and other applications running on the affected host.

The RPC servers associated with system services in Exchange, SQL, Windows NT 4.0 and Windows 2000 are subject to this issue.
http://www.securityfocus.com/bid/3104/discussion/
незаметил, это DoS т.е. не в тему. согласен.
3. VU#225555 - Microsoft SQL Server contains buffer overflow in
pwdencrypt() function (CAN-2002-0624)

The Microsoft SQL Server provides multiple methods for users to
authenticate to SQL databases. When SQL Server Authentication is
used, the username and password of each database user is stored in a
database on the SQL server. When users supply a password to the
server using this method, a function named pwdencrypt() is
responsible for encrypting the user-supplied password so that it can
be compared to the encrypted password stored on the SQL server.

There is a buffer overflow in pwdencrypt() that allows remote
attackers to execute arbitrary code on the SQL server by supplying a
crafted password value. Successful exploitation of this
vulnerability requires knowledge of a valid username and will cause
the supplied code to execute with the privileges of the SQL service
account.
http://www.securityfocus.com/advisories/4308
http://www.securityfocus.com/bid/5311/discussion/
> переполнение буфера в хранимой процедуре - нужен валидный > логин и определенные привелегии

> тут СОРОК ЧЕТЫРЕ подобных ошибки... не все про 8ку... но
> почитать интересно будет :)

я знаю такой :) sa и с привилегия ми все ОК, да и нет ни в одном алерте упоминаний о привелегиях.

НЕЗАЧЕТ
4. VU#399260 - Microsoft SQL Server 2000 contains heap buffer overflow in
SQL Server Resolution Service (CAN-2002-0649)

The SQL Server Resolution Service (SSRS) was introduced in Microsoft
SQL Server 2000 to provide referral services for multiple server
instances running on the same machine. The service listens for
requests on UDP port 1434 and returns the IP address and port number
of the SQL server instance that provides access to the requested
database.

The SSRS contains a heap buffer overflow that allows unauthenticated
remote attackers to execute arbitrary code by sending a crafted
request to port 1434/udp. The code within such a request will be
executed by the server host with the privileges of the SQL Server
service account.
http://www.securityfocus.com/advisories/4308
http://www.securityfocus.com/bid/5311/discussion/
>4. переполнение буфера в сервисе, который иногда ставят

это дефаултная инсталяция. (как и oracle extproc)

НЕЗАЧЕТ.
5. VU#484891 - Microsoft SQL Server 2000 contains stack buffer overflow in
SQL Server Resolution Service (CAN-2002-0649)

The SSRS also contains a stack buffer overflow that allows
unauthenticated remote attackers to execute arbitrary code by sending
a crafted request to port 1434/udp. The code within such a request
will be executed by the server host with the privileges of the SQL
Server service account.
http://www.securityfocus.com/advisories/4308
http://www.securityfocus.com/bid/5311/discussion/
> 5. тоже самое... видимо для крутизны
> ну вот похоже :)
> http://www.appsecinc.com/resources/alerts/oracle/02-0014.ht ml

смотрим и удивляемся а какая связь с RDBMS ? ... речь про
Oracle Enterprise Manager (EM) SNMP monitoring capability for Oracle Database

>http://www.oracle.com/technology/deploy/security/pdf/OLS817alert.pdf
Three security vulnerabilities have been discovered in Oracle Label Security which may allow users to gain a higher level of access to data.

т.е. ни в какое сравнение с unauthenticated remote attackers не идет.

НЕЗАЧЕТ.

6. Microsoft SQL Server uses LPC (Local Procedure Calls) to
implement some of its inter-processes communication. The
port providing this service can be used by anyone. By sending
a specially crafted message to SQL Server through this port,
an attacker can overwrite certain parts of memory and thus
execute code using the SQL Server's credentials.
http://www.securityfocus.com/archive/1/330179
>локальный эксплоит. нужно работать на машине с СКЛ-сервером >и быть аутентифицированным пользователем

чтоб послать на tpc порт не нужно быть "аутентифицированным пользователем"
The port providing this service can be used by anyone.

НЕЗАЧЕТ
7. Microsoft SQL Server supports SQL queries over a named pipe. This
pipe allows write access to the group "Everyone" and is therefor
accessible to anyone that can authenticate, local or remote. By
sending a large request to this pipe (size depends on service pack
level), the service can be rendered unresponsive. The behavior of
the service depends upon the service pack level.
http://www.securityfocus.com/archive/1/330177
>7. ДОС по наймедпайпам - см. п.п.2

тут еще посмотрю что такое:
therefor
accessible to anyone that can authenticate, local or remote.
8. MS SQL Server has two means of authenticating users. One uses Windows
Authentication, and the other is the built-in SQL Authentication (which
includes the 'sa' account). The passwords for the SQL Authentication are
sent over the network using a very weak password encryption method. This was
first mentioned in David Litchfield's paper "Threat Profiling Microsoft SQL
Server".
http://www.securityfocus.com/archive/1/298361
> 8. плохой алгоритм шифрации пароля при пересылке
> "встроенной" аутентификации
я знаю :) поэтому этот баг сдесь.

>читать _внимательно >http://www.dbspecialists.com/presentations/net8_security.htm

в свое время я достаточно внимательно читал оригинал :) боюсь ничего нового я там не увижу ...

НЕЗАЧЕТ.

Последствия:
The Slammer worm penetrated a private computer network at Ohio's Davis-Besse nuclear power plant in January and disabled a safety monitoring system for nearly five hours, despite a belief by plant personnel that the network was protected by a firewall, SecurityFocus has learned.
http://www.theregister.com/2003/08/20/slammer_worm_crashed_ohio_nuke/

Some Bank of America ATMs were still out Monday, primarily in the Southeast, a bank spokesman said. And analysts blamed a dip in South Korea's stock market on the worm taking down most Internet connections in the country over the weekend.
http://www.cnn.com/2003/TECH/internet/01/27/worm.why/

Почти все заказчики крупнейшего ISP Южной Кореи KT Corp лишились связи. В Китае прекратилось обновление сайтов и существенно замедлился доступ к ним. Наконец, червь подточил серверы доменных имен.
http://www.zdnet.ru/?ID=294867

On Thursday, London-based market intelligence firm Mi2g said that the worm caused between $950 million and $1.2 billion in lost productivity in its first five days worldwide.
http://news.com.com/Counting+the+cost+of+Slammer/2100-1001_3-982955.html