The Active Network
ActiveMac Anonymous | Create a User | Reviews | News | Forums | Advertise  
 

  *  

  Microsoft Security Bulletin MS02-035: SQL Server Installation Process May Leave Passwords on System (Q263968)
Time: 03:52 EST/08:52 GMT | News Source: Microsoft TechNet Security | Posted By: Matthew Sabean

When installing SQL Server 7.0 (including MSDE 1.0), SQL Server 2000, or a service pack for SQL Server 7.0 or SQL Server 2000, the information provided for the install process is collected and stored in a setup file called setup.iss. The setup.iss file can then be used to automate the installation of additional SQL Server systems. SQL Server 2000 also includes the ability to record an unattended install to the setup.iss file without having to actually perform an installation. The administrator setting up the SQL Server can supply a password to the installation routine under the following circumstances:
- If the SQL Server is being set up in "Mixed Mode", a password for the SQL Server administrator (the "sa" account) must be supplied.
- Whether in Mixed Mode or Windows Authentication Mode, a User ID and password can optionally be supplied for the purpose of starting up SQL Server service accounts.

In either case, the password would be stored in the setup.iss file. Prior to SQL Server 7.0 Service Pack 4, the passwords were stored in clear text. For SQL Server 7.0 Service Pack 4 and SQL Server 2000 Service Packs 1 and 2, the passwords are encrypted and then stored. Additionally, a log file is created during the installation process that shows the results of the installation. The log file would also include any passwords that had been stored in the setup.iss file.
A security vulnerability results because of two factors:
- The files remain on the server after the installation is complete. Except for the setup.iss file created by SQL Server 2000, the files are in directories that can be accessed by anyone who can interactively log on to the system.
- The password information stored in the files is either in clear text (for SQL Server 7.0 prior to Service Pack 4) or encrypted using fairly weak protection. An attacker who recovered the files could subject them to a password cracking attack to learn the passwords, potentially compromising the sa password and/or a domain account password.

Download locations for this patch The KillPwd utility can be obtained at the following location:
Microsoft SQL 7, MSDE 1.0, and Microsoft SQL Server 2000:
http://www.microsoft.com/Downloads/Release.asp?ReleaseID=40205

Write Comment
Return to News

  Displaying 401 through 412 of 412
Prev | First
  The time now is 2:12:06 PM ET.
Any comment problems? E-mail us
#401 By 4240821 (172.120.204.14) at 1/18/2025 1:34:31 PM
https://justpaste.me/XrCi3
https://justpaste.me/XldJ1
https://justpaste.me/XoP71
https://justpaste.me/XvSj1
https://justpaste.me/XgwC3
https://justpaste.me/XoFE3
https://justpaste.me/Xizm6
https://justpaste.me/Xsa33
https://justpaste.me/XxBC
https://justpaste.me/XUgm2

#402 By 4240821 (176.100.131.189) at 1/18/2025 7:51:53 PM
https://justpaste.me/XlUt2
https://justpaste.me/XXlS4
https://justpaste.me/XopV
https://justpaste.me/Xauf2
https://justpaste.me/Xuvx1
https://justpaste.me/XTqi1
https://justpaste.me/Y2ZS1
https://justpaste.me/XjBK3
https://justpaste.me/XSOa
https://justpaste.me/Xud2

#403 By 4240821 (172.120.204.14) at 1/20/2025 1:59:57 PM
https://justpaste.me/Xa6I
https://justpaste.me/XvUp
https://justpaste.me/XmRX4
https://justpaste.me/XUOb1
https://justpaste.me/XPR11
https://justpaste.me/Xbb5
https://justpaste.me/XRlC
https://justpaste.me/Xetg1
https://justpaste.me/Xype1
https://justpaste.me/XzBj1

#404 By 4240821 (136.0.102.21) at 1/21/2025 5:23:47 AM
https://justpaste.me/Xgty3
https://justpaste.me/Xo4i1
https://justpaste.me/XxuS3
https://justpaste.me/Y0nD1
https://justpaste.me/Y0SS
https://justpaste.me/Xp9A
https://justpaste.me/XpA9
https://justpaste.me/XMUf2
https://justpaste.me/XtXN
https://justpaste.me/XUyW1

#405 By 4240821 (23.230.77.30) at 1/22/2025 1:42:20 PM
https://justpaste.me/XT6t
https://justpaste.me/XZv7
https://justpaste.me/XR641
https://justpaste.me/XeXp2
https://justpaste.me/Xnv02
https://justpaste.me/XiwU5
https://justpaste.me/XSbk
https://justpaste.me/XTLu1
https://justpaste.me/XgYi4
https://justpaste.me/XatY1

#406 By 4240821 (176.100.131.189) at 1/23/2025 12:05:23 PM
https://justpaste.me/XcxR3
https://justpaste.me/XlX12
https://justpaste.me/XXkG1
https://justpaste.me/XTLu1
https://justpaste.me/Xamy1
https://justpaste.me/XxTL
https://justpaste.me/Xiyh5
https://justpaste.me/XqsO2
https://justpaste.me/XeDi2
https://justpaste.me/XnHo1

#407 By 4240821 (23.230.77.30) at 1/25/2025 9:25:09 AM
https://justpaste.me/XWDZ3
https://justpaste.me/XwHY3
https://justpaste.me/XzM51
https://justpaste.me/Xelx2
https://justpaste.me/XjMK2
https://justpaste.me/Y1xS1
https://justpaste.me/XY9T
https://justpaste.me/XS3a
https://justpaste.me/Y37e
https://justpaste.me/XOvG

#408 By 4240821 (176.100.131.189) at 1/26/2025 9:16:53 AM
https://justpaste.me/XXyU
https://justpaste.me/XrNR
https://justpaste.me/XXYm1
https://justpaste.me/Xogu1
https://justpaste.me/Y2WR1
https://justpaste.me/Xr8n
https://justpaste.me/XO96
https://justpaste.me/XdQl
https://justpaste.me/Xeo81
https://justpaste.me/Xgpa2

#409 By 4240821 (212.193.140.244) at 1/28/2025 2:43:56 AM
https://justpaste.me/XzAP2
https://justpaste.me/XWkz2
https://justpaste.me/XZmq
https://justpaste.me/XwIk
https://justpaste.me/Y2ky
https://justpaste.me/XXWT
https://justpaste.me/XMBo3
https://justpaste.me/XWDZ3
https://justpaste.me/Xj75
https://justpaste.me/XZtl3

#410 By 4240821 (142.111.253.203) at 1/29/2025 6:36:29 AM
https://justpaste.me/XqfC2
https://justpaste.me/XfL3
https://justpaste.me/XUpQ1
https://justpaste.me/XbQ91
https://justpaste.me/XT3z
https://justpaste.me/XWrr1
https://justpaste.me/Xcgm1
https://justpaste.me/Xt6c
https://justpaste.me/Xh7D
https://justpaste.me/XtDd

#411 By 4240821 (193.36.231.79) at 1/30/2025 8:58:06 AM
https://justpaste.me/XkCH4
https://justpaste.me/XRx41
https://justpaste.me/XTAb2
https://justpaste.me/XvZK1
https://justpaste.me/XaJt
https://justpaste.me/XoAx
https://justpaste.me/XxJI6
https://justpaste.me/XsWU
https://justpaste.me/Xs1c1
https://justpaste.me/XkRO2

#412 By 4240821 (193.160.216.96) at 2/9/2025 12:07:25 PM
https://hotpic.cc/album/rNBEiMokhYDp3
https://hotpic.cc/album/Ci7Vintv41VeT
https://hotpic.cc/album/VJpocRWnuv66c
https://hotpic.cc/album/TgIxYHASvnXmt
https://hotpic.cc/album/dLhLt4QBF0u6R
https://hotpic.cc/album/uSONTy57Ynr7t
https://hotpic.cc/album/UzLi3sS7WbaUZ
https://hotpic.cc/album/KuxUDx1wuqfYS
https://hotpic.cc/album/6y8Syd7pxrQMr
https://hotpic.cc/album/HsEcJSb9jWF1y

Write Comment
Return to News
  Displaying 401 through 412 of 412
Prev | First
  The time now is 2:12:06 PM ET.
Any comment problems? E-mail us
User name and password:

 

  *  
  *   *