First published: Tue Jul 09 2024(Updated: )
SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft SQL Server 2017 | ||
Microsoft SQL Server 2019 for Linux Containers | ||
Microsoft SQL Server 2022 | ||
Microsoft SQL Server 2016 Azure Connect Feature Pack | ||
Microsoft SQL Server | ||
Microsoft SQL Server 2016 T-SQL Language Service | ||
Microsoft SQL Server 2016 T-SQL Language Service | <13.0.6441.1 | |
Microsoft SQL Server 2016 T-SQL Language Service | >=13.0.7000.253<13.0.7037.1 | |
Microsoft SQL Server | <14.0.2056.2 | |
Microsoft SQL Server | >=14.0.3456.2<14.0.3471.2 | |
Microsoft SQL Server | <15.0.2116.2 | |
Microsoft SQL Server | >=15.0.4375.4<15.0.4382.1 | |
Microsoft SQL Server | <16.0.1121.4 | |
Microsoft SQL Server | >=16.0.4125.3<16.0.4131.2 | |
Microsoft SQL Server | ||
Microsoft SQL Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-37321 is rated as a critical vulnerability that can lead to remote code execution.
To fix CVE-2024-37321, apply the latest security patches available for your affected SQL Server version from Microsoft.
CVE-2024-37321 affects Microsoft SQL Server 2016, 2017, 2019, and 2022, depending on specific versions.
Yes, CVE-2024-37321 can be exploited remotely, allowing attackers to run arbitrary code on the system.
Systems running vulnerable versions of Microsoft SQL Server with the Native Client OLE DB Provider are at risk from CVE-2024-37321.