First published: Tue Dec 31 2002(Updated: )
Microsoft SQL Server 6.0 through 2000, with SQL Authentication enabled, uses weak password encryption (XOR), which allows remote attackers to sniff and decrypt the password.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft SQL Server | =7.0-sp1 | |
Microsoft SQL Server | =2000-sp2 | |
Microsoft SQL Server | =7.0 | |
Microsoft SQL Server | =2000 | |
Microsoft SQL Server | =2000-sp1 | |
Microsoft SQL Server | =6.0 | |
Microsoft SQL Server | =7.0-sp3 | |
Microsoft SQL Server | =7.0-sp4 | |
Microsoft SQL Server | =6.5 | |
Microsoft SQL Server | =7.0-sp2 | |
=6.0 | ||
=6.5 | ||
=7.0 | ||
=7.0-sp1 | ||
=7.0-sp2 | ||
=7.0-sp3 | ||
=7.0-sp4 | ||
=2000 | ||
=2000-sp1 | ||
=2000-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1872 is considered a critical vulnerability due to its potential for remote exploitation.
To mitigate CVE-2002-1872, it is recommended to disable SQL Authentication or upgrade to a version of SQL Server that uses stronger password encryption.
CVE-2002-1872 affects Microsoft SQL Server versions 6.0 through 2000, including various service packs.
CVE-2002-1872 allows attackers to sniff and decrypt weakly encrypted passwords, enabling unauthorized access to the database.
A workaround for CVE-2002-1872 includes using integrated Windows authentication instead of SQL Authentication.