CVE-2023-38169: Microsoft SQL OLE DB Remote Code Execution Vulnerability
Overview
- Severity
- High (CVSS 8.8)
- CVSS Vector
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
- Category
- Remote Code Execution
- Exploit Status
- Not Exploited
- Exploitation Likelihood
- Less Likely
- Patch Tuesday
- 2023-Aug
- Released
- 2023-08-08
- EPSS Score
- 0.38% (percentile: 59.5%)
FAQ
If I normally install GDR versions and have not installed the June Cumulative Update, am I affected by the vulnerability?
Yes, customers who have installed Microsoft SQL Server 2022 for x64-based Systems (GDR) or Microsoft SQL Server 2019 for x64-based Systems (GDR) are vulnerable. Microsoft recommends updating to the latest cumulative update to be protected from this vulnerability.
How could an attacker exploit this vulnerability?
An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.
Affected Products (10)
SQL Server
- Microsoft OLE DB Driver 19 for SQL Server
- Microsoft OLE DB Driver 18 for SQL Server
- Microsoft ODBC Driver 18 for SQL Server on Linux
- Microsoft ODBC Driver 17 for SQL Server on MacOS
- Microsoft SQL Server 2022 for x64-based Systems (CU 5)
- Microsoft ODBC Driver 17 for SQL Server on Linux
- Microsoft ODBC Driver 18 for SQL Server on MacOS
- Microsoft SQL Server 2019 for x64-based Systems (CU 21)
- Microsoft ODBC Driver 17 for SQL Server on Windows
- Microsoft ODBC Driver 18 for SQL Server on Windows
Security Updates (10)
Acknowledgments
bee13oy with <a href="https://www.cyberkl.com/">Cyber Kunlun Lab</a>
Revision History
- 2023-08-08: Information published. This CVE was addressed by SQL related updates that were released in June 2023, but the CVE was inadvertently omitted from the June 2023 Security Updates. This is an informational change only. Customers who have already installed the June 2023 update do not need to take any further action.