'; echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "www.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "www.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "www.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "www.hp-telecom.com") { echo ''; echo 'hp-telecom'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

MSSQL Attack (Attack ID:1600029)

Release Date:2009-09-27

Attack Name:Xp_oagetproperty vulnerable function attempt

OS Type

Application Type

Severity:Info

BUG ID

CVE ID

 

Description

This event is generated when an attempt is made to exploit a known vulnerability in Microsoft systems using Microsoft SQL Server.
Microsoft SQL Server is a database platform for use on hosts using the Microsoft Windows operating system.
A vulnerability in the handling of functions available through the Extended Stored Procedures API may allow an attacker to overflow a fixed length buffer and execute code of their choosing on an affected host. A DoS condition may also result due to the server failing to handle a memory copy routine properly which may cause the server to crash.
In particular this rule generates an event when an attempt is made to exploit the function 'xp_oagetproperty'.

Impact:
Serious. Denial of Service. Code execution may be possible.

Affected Systems:
Microsoft Windows SQL Server 2000

Additional References:
Microsoft 10 Steps to Help Secure SQL Server 2000
https://www.microsoft.com/sql/prodinfo/previousversions/securingsqlserver.mspx

http://support.microsoft.com/kb/280380
http://www.microsoft.com/technet/security/bulletin/ms00-092.mspx

 

Solution

Ensure the system is using an up to date version of the software and has had all vendor supplied patches applied.