Korean
<< Back
VID 25009
Severity 40
Port 1433
Protocol TCP
Class DB
Detailed Description The Microsoft SQL Server contains some default accounts. If the sa account is left with a blank password, any user can act as administrator on the SQL server. An authorized user who has gained access to the sa account can also execute arbitrary commands on the system with whatever user privileges the Microsoft SQL services are running under, through the use of various procedures such as xp_cmdshell().
This vulnerability is exploited by the Cblade worm and the SQL Spida worm.

* References:
http://support.microsoft.com/default.aspx?scid=kb;en-us;Q322336
http://www.iss.net/security_center/static/7610.php
http://www.kb.cert.org/vuls/id/635463
http://www.iss.net/security_center/static/9124.php
http://marc.theaimsgroup.com/?l=bugtraq&m=96333895000350&w=2
http://security-archive.merton.ox.ac.uk/bugtraq-200008/0233.html
http://support.microsoft.com/default.aspx?scid=kb;[LN];Q313418
http://www.iss.net/security_center/alerts/advise118.php
http://support.microsoft.com/support/kb/articles/Q274/7/73.ASP
http://www.securiteam.com/windowsntfocus/5EP0O0K2AS.html
http://www.securityfocus.com/bid/4797
http://www.iss.net/security_center/static/1459.php

* Platforms Affected:
Microsoft SQL Server Any version
Microsoft Data Engine Any version
Recommendation Configure a password for the default account that is difficult to guess. You can use the sp_password stored procedure from the SQL query window to set up a password. For example, to set the SA password from NULL to "complexpwd", you can use code similar to:

exec sp_password NULL,'complexpwd','sa'
Related URL CVE-2000-1209 (CVE)
Related URL 4797 (SecurityFocus)
Related URL 1459 (ISS)