Security Updates for Microsoft SQL Server (September 2024) (Remote)

high Nessus Plugin ID 207069

Synopsis

The Microsoft SQL Server installation on the remote host is missing a security update.

Description

The Microsoft SQL Server installation on the remote host is missing a security update. It is, therefore, affected by the following vulnerabilities:

- A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2024-26186, CVE-2024-26191, CVE-2024-37335, CVE-2024-37338, CVE-2024-37339, CVE-2024-37340)

- An information disclosure vulnerability. An authenticated, remote attacker can exploit this to disclose sensitive database and file information. (CVE-2024-37337, CVE-2024-37342, CVE-2024-37966)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Microsoft has released security updates for Microsoft SQL Server.

See Also

https://support.microsoft.com/en-us/help/5042578

https://support.microsoft.com/en-us/help/5042749

https://support.microsoft.com/en-us/help/5042211

https://support.microsoft.com/en-us/help/5042215

https://support.microsoft.com/en-us/help/5042214

https://support.microsoft.com/en-us/help/5042217

Plugin Details

Severity: High

ID: 207069

File Name: smb_nt_ms24_sep_mssql_remote.nasl

Version: 1.5

Type: remote

Agent: windows

Published: 9/12/2024

Updated: 11/28/2024

Configuration: Enable paranoid mode, Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 6.7

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-37340

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:sql_server

Required KB Items: Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 9/10/2024

Vulnerability Publication Date: 9/10/2024

Reference Information

CVE: CVE-2024-26186, CVE-2024-26191, CVE-2024-37335, CVE-2024-37337, CVE-2024-37338, CVE-2024-37339, CVE-2024-37340, CVE-2024-37342, CVE-2024-37966

IAVA: 2024-A-0565-S

MSFT: MS24-5042211, MS24-5042214, MS24-5042215, MS24-5042217, MS24-5042578, MS24-5042749

MSKB: 5042211, 5042214, 5042215, 5042217, 5042578, 5042749