The Active Network
ActiveMac Anonymous | Create a User | Reviews | News | Forums | Advertise  
 

  *  

  Microsoft Security Bulletin MS02-035: SQL Server Installation Process May Leave Passwords on System (Q263968)
Time: 03:52 EST/08:52 GMT | News Source: Microsoft TechNet Security | Posted By: Matthew Sabean

When installing SQL Server 7.0 (including MSDE 1.0), SQL Server 2000, or a service pack for SQL Server 7.0 or SQL Server 2000, the information provided for the install process is collected and stored in a setup file called setup.iss. The setup.iss file can then be used to automate the installation of additional SQL Server systems. SQL Server 2000 also includes the ability to record an unattended install to the setup.iss file without having to actually perform an installation. The administrator setting up the SQL Server can supply a password to the installation routine under the following circumstances:
- If the SQL Server is being set up in "Mixed Mode", a password for the SQL Server administrator (the "sa" account) must be supplied.
- Whether in Mixed Mode or Windows Authentication Mode, a User ID and password can optionally be supplied for the purpose of starting up SQL Server service accounts.

In either case, the password would be stored in the setup.iss file. Prior to SQL Server 7.0 Service Pack 4, the passwords were stored in clear text. For SQL Server 7.0 Service Pack 4 and SQL Server 2000 Service Packs 1 and 2, the passwords are encrypted and then stored. Additionally, a log file is created during the installation process that shows the results of the installation. The log file would also include any passwords that had been stored in the setup.iss file.
A security vulnerability results because of two factors:
- The files remain on the server after the installation is complete. Except for the setup.iss file created by SQL Server 2000, the files are in directories that can be accessed by anyone who can interactively log on to the system.
- The password information stored in the files is either in clear text (for SQL Server 7.0 prior to Service Pack 4) or encrypted using fairly weak protection. An attacker who recovered the files could subject them to a password cracking attack to learn the passwords, potentially compromising the sa password and/or a domain account password.

Download locations for this patch The KillPwd utility can be obtained at the following location:
Microsoft SQL 7, MSDE 1.0, and Microsoft SQL Server 2000:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=40205

Write Comment
Return to News

  Displaying 301 through 302 of 302
Prev | First
  The time now is 11:39:00 AM ET.
Any comment problems? E-mail us
#301 By 4240821 (82.117.86.164) at 11/26/2024 6:07:23 PM
https://justpaste.me/CWcJ2
https://justpaste.me/Bg8x2
https://justpaste.me/CVOU
https://justpaste.me/CFmw1
https://justpaste.me/Bp5B
https://justpaste.me/CLt0
https://justpaste.me/CCQM
https://justpaste.me/CYWd3
https://justpaste.me/C1UY3
https://justpaste.me/C2kq1

#302 By 4240821 (80.73.244.53) at 11/27/2024 9:10:54 PM
https://www.google.tn/amp/s/sluts.su/get/a189/a189trpebcfoabrdzwg.php
https://www.google.vg/amp/s/sexonly.su/get/a200/a200gzvdpmhlakjnnmi.php
https://www.google.tn/amp/s/nsfw.su/get/a118/a118yedvuixfjqmmywk.php
https://www.google.to/amp/s/sexonly.top/get/a132/a132pwqquuyommcbxba.php
https://www.google.us/amp/s/lustful.su/get/a261/a261denuvtmtjxiejkm.php
https://www.google.vg/amp/s/sexonly.top/get/a219/a219kprcyspspjtysxd.php
https://www.google.tt/amp/s/lustful.su/get/a233/a233makirttvduxaetm.php
https://www.google.tt/amp/s/nsfw.su/get/a76/a76dpjbdgnuaruosgy.php
https://www.google.vu/amp/s/sexonly.top/get/a73/a73dvfeofqnvlmddrt.php
https://www.google.tn/amp/s/lustful.su/get/a67/a67pogegntgnbwpskr.php

Write Comment
Return to News
  Displaying 301 through 302 of 302
Prev | First
  The time now is 11:39:00 AM ET.
Any comment problems? E-mail us
User name and password:

 

  *  
  *   *