First published: Tue Jul 09 2024(Updated: )
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Visual Studio 2017 (includes 15.0 - 15.8) | =15.9 | |
Microsoft Visual Studio 2019 (includes 16.0 - 16.10) | =16.11 | |
Microsoft Visual Studio | =17.11 | |
Microsoft Visual Studio | =17.8 | |
Microsoft Visual Studio | =17.6 | |
Microsoft SQL Server 2017 | ||
Microsoft SQL Server 2019 for Linux Containers | ||
Microsoft SQL Server 2022 | ||
Microsoft SQL Server 2016 Azure Connect Feature Pack | ||
Microsoft SQL Server 2016 (CU 17) | ||
Microsoft SQL Server | ||
Microsoft SQL Server 2016 (CU 17) | <13.0.6441.1 | |
Microsoft SQL Server 2016 (CU 17) | >=13.0.7000.253<13.0.7037.1 | |
Microsoft SQL Server | <14.0.2056.2 | |
Microsoft SQL Server | >=14.0.3456.2<14.0.3471.2 | |
Microsoft SQL Server | <15.0.2116.2 | |
Microsoft SQL Server | >=15.0.4375.4<15.0.4382.1 | |
Microsoft SQL Server | <16.0.1121.4 | |
Microsoft SQL Server | >=16.0.4125.3<16.0.4131.2 | |
Microsoft SQL Server | ||
Microsoft SQL Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-35272 has been rated as a critical vulnerability due to its potential to allow remote code execution.
To remediate CVE-2024-35272, apply the latest security patches provided by Microsoft for the affected SQL Server versions.
CVE-2024-35272 impacts Microsoft SQL Server 2016, 2017, 2019, and 2022 prior to specific patch versions.
CVE-2024-35272 can lead to unauthorized remote code execution, compromising the integrity and security of the SQL Server environment.
As of now, there are no publicly disclosed exploits for CVE-2024-35272, but its critical nature suggests it could be targeted.