CVE-2008-0085

SQL Server 7.0 SP4, 2000 SP4, 2005 SP1 and SP2, 2000 Desktop Engine (MSDE 2000) SP4, 2005 Express Edition SP1 and SP2, and 2000 Desktop Engine (WMSDE); Microsoft Data Engine (MSDE) 1.0 SP4; and Internal Database (WYukon) SP2 does not initialize memory pages when reallocating memory, which allows database operators to obtain sensitive information (database contents) via unknown vectors related to memory page reuse.
References
Link Resource
http://secunia.com/advisories/30970 Vendor Advisory
http://www.securityfocus.com/archive/1/516397/100/0/threaded Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1020441 Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA08-190A.html Third Party Advisory US Government Resource
http://www.vmware.com/security/advisories/VMSA-2011-0003.html Patch Third Party Advisory
http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html Third Party Advisory
http://www.vupen.com/english/advisories/2008/2022/references Broken Link
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-040 Patch Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14213 Third Party Advisory
http://secunia.com/advisories/30970 Vendor Advisory
http://www.securityfocus.com/archive/1/516397/100/0/threaded Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1020441 Third Party Advisory VDB Entry
http://www.us-cert.gov/cas/techalerts/TA08-190A.html Third Party Advisory US Government Resource
http://www.vmware.com/security/advisories/VMSA-2011-0003.html Patch Third Party Advisory
http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html Third Party Advisory
http://www.vupen.com/english/advisories/2008/2022/references Broken Link
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-040 Patch Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14213 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:microsoft:data_engine:1.0:sp4:*:*:*:*:*:*
cpe:2.3:a:microsoft:sql_server:7.0:sp4:*:*:*:*:*:*
cpe:2.3:a:microsoft:sql_server:2000:sp4:*:*:*:*:*:*
cpe:2.3:a:microsoft:sql_server:2000:sp4:*:*:*:*:itanium:*
cpe:2.3:a:microsoft:sql_server:2005:sp1:*:*:*:*:*:*
cpe:2.3:a:microsoft:sql_server:2005:sp1:*:*:*:*:itanium:*
cpe:2.3:a:microsoft:sql_server:2005:sp1:*:*:*:*:x64:*
cpe:2.3:a:microsoft:sql_server:2005:sp1:express:*:*:*:*:*
cpe:2.3:a:microsoft:sql_server:2005:sp2:*:*:*:*:*:*
cpe:2.3:a:microsoft:sql_server:2005:sp2:*:*:*:*:itanium:*
cpe:2.3:a:microsoft:sql_server:2005:sp2:*:*:*:*:x64:*
cpe:2.3:a:microsoft:sql_server:2005:sp2:express:*:*:*:*:*
cpe:2.3:a:microsoft:sql_server_desktop_engine:2000:sp4:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:a:microsoft:wmsde:2000:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:wyukon:*:sp2:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_2003_server:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:-:sp2:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:a:microsoft:wmsde:2000:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:wyukon:*:sp2:*:*:*:*:x64:*
OR cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*

History

21 Nov 2024, 00:41

Type Values Removed Values Added
References () http://secunia.com/advisories/30970 - Vendor Advisory () http://secunia.com/advisories/30970 - Vendor Advisory
References () http://www.securityfocus.com/archive/1/516397/100/0/threaded - Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/516397/100/0/threaded - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id?1020441 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id?1020441 - Third Party Advisory, VDB Entry
References () http://www.us-cert.gov/cas/techalerts/TA08-190A.html - Third Party Advisory, US Government Resource () http://www.us-cert.gov/cas/techalerts/TA08-190A.html - Third Party Advisory, US Government Resource
References () http://www.vmware.com/security/advisories/VMSA-2011-0003.html - Patch, Third Party Advisory () http://www.vmware.com/security/advisories/VMSA-2011-0003.html - Patch, Third Party Advisory
References () http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html - Third Party Advisory () http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html - Third Party Advisory
References () http://www.vupen.com/english/advisories/2008/2022/references - Broken Link () http://www.vupen.com/english/advisories/2008/2022/references - Broken Link
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-040 - Patch, Vendor Advisory () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-040 - Patch, Vendor Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14213 - Third Party Advisory () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14213 - Third Party Advisory

Information

Published : 2008-07-08 23:41

Updated : 2024-11-21 00:41


NVD link : CVE-2008-0085

Mitre link : CVE-2008-0085

CVE.ORG link : CVE-2008-0085


JSON object : View

Products Affected

microsoft

  • sql_server_desktop_engine
  • wyukon
  • wmsde
  • sql_server
  • data_engine
  • windows_2003_server
  • windows_server_2003
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor