Short Name |
DB:MS-SQL:DOS1 |
---|---|
Severity |
Warning |
Recommended |
No |
Category |
DB |
Keywords |
MS-SQL Server Network-Based DoS |
Release Date |
2003/04/22 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability in Microsoft SQL Server. When the SQL Server receives 0x0A as the first byte of a UDP/1434 packet, the server sends a similar packet to the source (as in a ping response). Attackers can spoof the source address to be another Microsoft SQL Server, creating a network-based denial-of-service (DoS) attack against both servers that consumes bandwidth and CPU resources.
Microsoft SQL Server 2000 uses a keep-alive mechanism which operates through the Resolution Service. If a particularly crafted data packet is sent to the SQL Server's keep-alive function, it will respond with an identical packet. If one such packet was sent to an SQL Server from another SQL Server, they would begin an infinite loop of keep-alive packets. Eventually, the servers will consume all available resources, resulting in a denial of services.