DB: MS-SQL Server Network-Based DoS

This signature detects attempts to exploit a known vulnerability in Microsoft SQL Server. When the SQL Server receives 0x0A as the first byte of a UDP/1434 packet, the server sends a similar packet to the source (as in a ping response). Attackers can spoof the source address to be another Microsoft SQL Server, creating a network-based denial-of-service (DoS) attack against both servers that consumes bandwidth and CPU resources.

Extended Description

Microsoft SQL Server 2000 uses a keep-alive mechanism which operates through the Resolution Service. If a particularly crafted data packet is sent to the SQL Server's keep-alive function, it will respond with an identical packet. If one such packet was sent to an SQL Server from another SQL Server, they would begin an infinite loop of keep-alive packets. Eventually, the servers will consume all available resources, resulting in a denial of services.

Affected Products

Microsoft sql_server_2000

Short Name
DB:MS-SQL:DOS1
Severity
Warning
Recommended
False
Recommended Action
None
Category
DB
Keywords
CVE-2002-0650 DoS MS-SQL Network-Based Server bid:5312
Release Date
04/22/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Microsoft

CVSS Score

5.0

Found a potential security threat?