First published: Tue Jul 09 2024(Updated: )
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft SQL Server 2017 | ||
Microsoft SQL Server 2019 for Linux Containers | ||
Microsoft SQL Server 2022 | ||
Microsoft SQL Server 2016 Azure Connect Feature Pack | ||
Microsoft SQL Server | ||
Microsoft SQL Server 2016 T-SQL Language Service | ||
Microsoft SQL Server 2016 T-SQL Language Service | =13.0.6441.1 | |
Microsoft SQL Server 2016 T-SQL Language Service | =13.0.7037.1 | |
Microsoft SQL Server | =14.0.2056.2 | |
Microsoft SQL Server | =14.0.3471.2 | |
Microsoft SQL Server | =15.0.2116.2 | |
Microsoft SQL Server | =15.0.4382.1 | |
Microsoft SQL Server | =16.0.1121.4 | |
Microsoft SQL Server | =16.0.4131.2 | |
Microsoft SQL Server | ||
Microsoft SQL Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20701 is rated as a critical vulnerability due to its potential for remote code execution.
To resolve CVE-2024-20701, apply the appropriate security patches provided by Microsoft for the affected SQL Server versions.
CVE-2024-20701 affects Microsoft SQL Server 2016, 2017, 2019, and 2022 specific builds.
Exploitation of CVE-2024-20701 could allow an attacker to execute arbitrary code on the server hosting the affected SQL Server software.
Currently, no specific workarounds are recommended for CVE-2024-20701 other than applying the security patches promptly.