This script is Copyright (C) 2001-2016 H D Moore
The remote database service has an account with a blank password.
The remote instance of MS SQL / SQL Server has the default 'sa'
account enabled without any password.
An attacker may leverage this flaw to execute commands against the
remote host, as well as read the content of any databases it might
Disable the 'sa' account or set a password for it.
In addition, filter incoming TCP traffic to this port.
For MSDE (OEM versions without MSQL console) :
C:\MSSQL7\BINN\osql -U sa
At the Password: prompt press <Enter>.
Type the following replacing .password. with the password you wish to
assign, in single quotes:
EXEC sp_password NULL, .password., .sa.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 7.1
Public Exploit Available : true
Nessus Plugin ID: 10673 ()
Bugtraq ID: 4797
CVE ID: CVE-2000-1209
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.