MS16-136: Security Update for SQL Server (3199641)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.

Synopsis :

The remote SQL server is affected by multiple vulnerabilities.

Description :

The remote Microsoft SQL Server is missing a security update. It is,
therefore, affected by multiple vulnerabilities :

- Multiple elevation of privilege vulnerabilities exist
in the SQL RDBMS Engine due to improper handling of
pointer casting. An authenticated, remote attacker can
exploit these to gain elevated privileges.
(CVE-2016-7249, CVE-2016-7250, CVE-2016-7254)

- A cross-site scripting (XSS) vulnerability exists in
the SQL server MDS API due to improper validation of a
request parameter on the SQL server site. An
unauthenticated, remote attacker can exploit this, via
a specially crafted request, to execute arbitrary code
in the user's browser session. (CVE-2016-7251)

- An information disclosure vulnerability exists in
Microsoft SQL Analysis Services due to improper
validation of the FILESTREAM path. An authenticated,
remote attacker can exploit this to disclose sensitive
database and file information. (CVE-2016-7252)

- An elevation of privilege vulnerability exists in the
Microsoft SQL Server Engine due to improper checking by
the SQL Server Agent of ACLs on atxcore.dll. An
authenticated, remote attacker can exploit this to gain
elevated privileges. (CVE-2016-7253)

See also :

Solution :

Microsoft has released a set of patches for SQL Server 2012, 2014, and

Risk factor :

High / CVSS Base Score : 9.0
CVSS Temporal Score : 6.7
Public Exploit Available : false

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 94637 ()

Bugtraq ID: 94037

CVE ID: CVE-2016-7249

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now