First published: Tue Jul 09 2024(Updated: )
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft SQL Server 2017 | ||
Microsoft SQL Server 2019 for Linux Containers | ||
Microsoft SQL Server 2022 | ||
Microsoft SQL Server 2016 Azure Connect Feature Pack | ||
Microsoft SQL Server | ||
Microsoft SQL Server 2016 T-SQL Language Service | ||
Microsoft SQL Server 2016 T-SQL Language Service | <13.0.6441.1 | |
Microsoft SQL Server 2016 T-SQL Language Service | >=13.0.7000.253<13.0.7037.1 | |
Microsoft SQL Server | <14.0.2056.2 | |
Microsoft SQL Server | >=14.0.3456.2<14.0.3471.2 | |
Microsoft SQL Server | <15.0.2116.2 | |
Microsoft SQL Server | >=15.0.4375.4<15.0.4382.1 | |
Microsoft SQL Server | <16.0.1121.4 | |
Microsoft SQL Server | >=16.0.4125.3<16.0.4131.2 | |
Microsoft SQL Server | ||
Microsoft SQL Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-35256 has a severity rating that indicates a potential for remote code execution.
CVE-2024-35256 affects specific versions of Microsoft SQL Server 2016, 2017, 2019, and 2022.
To fix CVE-2024-35256, apply the latest security updates and patches provided by Microsoft for the affected SQL Server versions.
Exploitation of CVE-2024-35256 could allow an attacker to execute arbitrary code on the affected SQL Server.
Currently, applying the necessary updates and patches is the primary method to mitigate the risks associated with CVE-2024-35256.