First published: Tue Jul 14 2015(Updated: )
Microsoft SQL Server 2008 SP3 and SP4, 2008 R2 SP2 and SP3, 2012 SP1 and SP2, and 2014, when transactional replication is configured, does not prevent use of uninitialized memory in unspecified function calls, which allows remote authenticated users to execute arbitrary code by leveraging certain permissions and making a crafted query, as demonstrated by the VIEW SERVER STATE permission, aka "SQL Server Remote Code Execution Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft SQL Server | =2008-r2_sp2 | |
Microsoft SQL Server | =2008-r2_sp3 | |
Microsoft SQL Server | =2008-sp3 | |
Microsoft SQL Server | =2008-sp4 | |
Microsoft SQL Server | =2012-sp1 | |
Microsoft SQL Server | =2012-sp2 | |
Microsoft SQL Server | =2014 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1762 has a moderate severity rating as it allows remote authenticated users to execute arbitrary code.
To fix CVE-2015-1762, apply the appropriate security updates provided by Microsoft for your version of SQL Server.
CVE-2015-1762 affects Microsoft SQL Server 2008 SP3 and SP4, 2008 R2 SP2 and SP3, 2012 SP1 and SP2, and 2014.
CVE-2015-1762 can facilitate attacks that allow remote authenticated users to execute arbitrary code on the affected SQL Server.
CVE-2015-1762 requires the attacker to have remote authenticated access, meaning it is not a network-level exploit without authentication.