CVE-2008-0107

Integer underflow in SQL Server 7.0 SP4, 2000 SP4, 2005 SP1 and SP2, 2000 Desktop Engine (MSDE 2000) SP4, 2005 Express Edition SP1 and SP2, and 2000 Desktop Engine (WMSDE); Microsoft Data Engine (MSDE) 1.0 SP4; and Internal Database (WYukon) SP2 allows remote authenticated users to execute arbitrary code via a (1) SMB or (2) WebDAV pathname for an on-disk file (aka stored backup file) with a crafted record size value, which triggers a heap-based buffer overflow, aka "SQL Server Memory Corruption Vulnerability."
References
Link Resource
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=723
http://secunia.com/advisories/30970 Vendor Advisory
http://www.insomniasec.com/advisories/ISVA-080709.1.htm
http://www.securityfocus.com/archive/1/494082/100/0/threaded
http://www.securityfocus.com/archive/1/516397/100/0/threaded
http://www.securityfocus.com/bid/30119
http://www.securitytracker.com/id?1020441
http://www.us-cert.gov/cas/techalerts/TA08-190A.html US Government Resource
http://www.vmware.com/security/advisories/VMSA-2011-0003.html
http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
http://www.vupen.com/english/advisories/2008/2022/references Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-040
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13936
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=723
http://secunia.com/advisories/30970 Vendor Advisory
http://www.insomniasec.com/advisories/ISVA-080709.1.htm
http://www.securityfocus.com/archive/1/494082/100/0/threaded
http://www.securityfocus.com/archive/1/516397/100/0/threaded
http://www.securityfocus.com/bid/30119
http://www.securitytracker.com/id?1020441
http://www.us-cert.gov/cas/techalerts/TA08-190A.html US Government Resource
http://www.vmware.com/security/advisories/VMSA-2011-0003.html
http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
http://www.vupen.com/english/advisories/2008/2022/references Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-040
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13936
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:microsoft:data_engine:1.0:sp4:*:*:*:*:*:*
cpe:2.3:a:microsoft:sql_server:7.0:sp4:*:*:*:*:*:*
cpe:2.3:a:microsoft:sql_server:2000:sp4:*:*:*:*:*:*
cpe:2.3:a:microsoft:sql_server:2000:sp4:itanium:*:*:*:*:*
cpe:2.3:a:microsoft:sql_server:2005:sp1:*:*:*:*:*:*
cpe:2.3:a:microsoft:sql_server:2005:sp1:express:*:*:*:*:*
cpe:2.3:a:microsoft:sql_server:2005:sp1:itanium:*:*:*:*:*
cpe:2.3:a:microsoft:sql_server:2005:sp1:x64:*:*:*:*:*
cpe:2.3:a:microsoft:sql_server:2005:sp2:*:*:*:*:*:*
cpe:2.3:a:microsoft:sql_server:2005:sp2:express:*:*:*:*:*
cpe:2.3:a:microsoft:sql_server:2005:sp2:itanium:*:*:*:*:*
cpe:2.3:a:microsoft:sql_server:2005:sp2:x64:*:*:*:*:*
cpe:2.3:a:microsoft:sql_server_desktop_engine:2000:sp4:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:a:microsoft:wmsde:2000:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:wyukon:*:sp2:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_2003_server:*:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:a:microsoft:wmsde:2000:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:wyukon:*:sp2:x64:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*

Configuration 4 (hide)

AND
OR cpe:2.3:a:microsoft:wyukon:*:sp2:*:*:*:*:*:*
cpe:2.3:a:microsoft:wyukon:*:sp2:x64:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*

History

21 Nov 2024, 00:41

Type Values Removed Values Added
References () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=723 - () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=723 -
References () http://secunia.com/advisories/30970 - Vendor Advisory () http://secunia.com/advisories/30970 - Vendor Advisory
References () http://www.insomniasec.com/advisories/ISVA-080709.1.htm - () http://www.insomniasec.com/advisories/ISVA-080709.1.htm -
References () http://www.securityfocus.com/archive/1/494082/100/0/threaded - () http://www.securityfocus.com/archive/1/494082/100/0/threaded -
References () http://www.securityfocus.com/archive/1/516397/100/0/threaded - () http://www.securityfocus.com/archive/1/516397/100/0/threaded -
References () http://www.securityfocus.com/bid/30119 - () http://www.securityfocus.com/bid/30119 -
References () http://www.securitytracker.com/id?1020441 - () http://www.securitytracker.com/id?1020441 -
References () http://www.us-cert.gov/cas/techalerts/TA08-190A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA08-190A.html - US Government Resource
References () http://www.vmware.com/security/advisories/VMSA-2011-0003.html - () http://www.vmware.com/security/advisories/VMSA-2011-0003.html -
References () http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html - () http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html -
References () http://www.vupen.com/english/advisories/2008/2022/references - Vendor Advisory () http://www.vupen.com/english/advisories/2008/2022/references - Vendor Advisory
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-040 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-040 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13936 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13936 -

Information

Published : 2008-07-08 23:41

Updated : 2024-11-21 00:41


NVD link : CVE-2008-0107

Mitre link : CVE-2008-0107

CVE.ORG link : CVE-2008-0107


JSON object : View

Products Affected

microsoft

  • sql_server_desktop_engine
  • wyukon
  • wmsde
  • sql_server
  • data_engine
  • windows_2003_server
  • windows_server_2003
  • windows_server_2008
CWE
CWE-189

Numeric Errors