CVE-2008-5416
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
10/12/2008
Last modified:
09/04/2025
Description
Heap-based buffer overflow in Microsoft SQL Server 2000 SP4, 8.00.2050, 8.00.2039, and earlier; SQL Server 2000 Desktop Engine (MSDE 2000) SP4; SQL Server 2005 SP2 and 9.00.1399.06; SQL Server 2000 Desktop Engine (WMSDE) on Windows Server 2003 SP1 and SP2; and Windows Internal Database (WYukon) SP2 allows remote authenticated users to cause a denial of service (access violation exception) or execute arbitrary code by calling the sp_replwritetovarbin extended stored procedure with a set of invalid parameters that trigger memory overwrite, aka "SQL Server sp_replwritetovarbin Limited Memory Overwrite Vulnerability."
Impact
Base Score 2.0
9.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:microsoft:sql_server:2000:*:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:sql_server:2005:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://archives.neohapsis.com/archives/fulldisclosure/2008-12/0304.html
- http://osvdb.org/50917
- http://secunia.com/advisories/33034
- http://securityreason.com/securityalert/4706
- http://securitytracker.com/id?1021363=
- http://securitytracker.com/id?1021490=
- http://support.avaya.com/elmodocs2/security/ASA-2009-055.htm
- http://www.kb.cert.org/vuls/id/696644
- http://www.microsoft.com/technet/security/advisory/961040.mspx
- http://www.sec-consult.com/files/20081209_mssql-2000-sp_replwritetovarbin_memwrite.txt
- http://www.securityfocus.com/archive/1/499042/100/0/threaded
- http://www.securityfocus.com/archive/1/499085/100/0/threaded
- http://www.securityfocus.com/archive/1/516397/100/0/threaded
- http://www.securityfocus.com/bid/32710
- http://www.us-cert.gov/cas/techalerts/TA09-041A.html
- http://www.vmware.com/security/advisories/VMSA-2011-0003.html
- http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
- http://www.vupen.com/english/advisories/2008/3380
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-004
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47182
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6217
- https://www.exploit-db.com/exploits/7501
- http://archives.neohapsis.com/archives/fulldisclosure/2008-12/0304.html
- http://osvdb.org/50917
- http://secunia.com/advisories/33034
- http://securityreason.com/securityalert/4706
- http://securitytracker.com/id?1021363=
- http://securitytracker.com/id?1021490=
- http://support.avaya.com/elmodocs2/security/ASA-2009-055.htm
- http://www.kb.cert.org/vuls/id/696644
- http://www.microsoft.com/technet/security/advisory/961040.mspx
- http://www.sec-consult.com/files/20081209_mssql-2000-sp_replwritetovarbin_memwrite.txt
- http://www.securityfocus.com/archive/1/499042/100/0/threaded
- http://www.securityfocus.com/archive/1/499085/100/0/threaded
- http://www.securityfocus.com/archive/1/516397/100/0/threaded
- http://www.securityfocus.com/bid/32710
- http://www.us-cert.gov/cas/techalerts/TA09-041A.html
- http://www.vmware.com/security/advisories/VMSA-2011-0003.html
- http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
- http://www.vupen.com/english/advisories/2008/3380
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-004
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47182
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6217
- https://www.exploit-db.com/exploits/7501