CVE-2023-38169: Microsoft SQL OLE DB Remote Code Execution Vulnerability

Overview

Severity
High (CVSS 8.8)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
Category
Remote Code Execution
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2023-Aug
Released
2023-08-08
EPSS Score
0.38% (percentile: 59.5%)

FAQ

If I normally install GDR versions and have not installed the June Cumulative Update, am I affected by the vulnerability? Yes, customers who have installed Microsoft SQL Server 2022 for x64-based Systems (GDR) or Microsoft SQL Server 2019 for x64-based Systems (GDR) are vulnerable. Microsoft recommends updating to the latest cumulative update to be protected from this vulnerability. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.

Affected Products (10)

SQL Server

  • Microsoft OLE DB Driver 19 for SQL Server
  • Microsoft OLE DB Driver 18 for SQL Server
  • Microsoft ODBC Driver 18 for SQL Server on Linux
  • Microsoft ODBC Driver 17 for SQL Server on MacOS
  • Microsoft SQL Server 2022 for x64-based Systems (CU 5)
  • Microsoft ODBC Driver 17 for SQL Server on Linux
  • Microsoft ODBC Driver 18 for SQL Server on MacOS
  • Microsoft SQL Server 2019 for x64-based Systems (CU 21)
  • Microsoft ODBC Driver 17 for SQL Server on Windows
  • Microsoft ODBC Driver 18 for SQL Server on Windows

Security Updates (10)

Acknowledgments

bee13oy with <a href="https://www.cyberkl.com/">Cyber Kunlun Lab</a>

Revision History

  • 2023-08-08: Information published. This CVE was addressed by SQL related updates that were released in June 2023, but the CVE was inadvertently omitted from the June 2023 Security Updates. This is an informational change only. Customers who have already installed the June 2023 update do not need to take any further action.