![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.802080 |
Categoría: | Windows : Microsoft Bulletins |
Título: | Microsoft SQL Server Elevation of Privilege Vulnerability (2984340) |
Resumen: | This host is missing an important security update according to; Microsoft Bulletin MS14-044. |
Descripción: | Summary: This host is missing an important security update according to Microsoft Bulletin MS14-044. Vulnerability Insight: Flaws are due to: - SQL Master Data Services (MDS) does not properly encode output. - SQL Server processes an incorrectly formatted T-SQL query. Vulnerability Impact: Successful exploitation will allow remote attackers to cause a Denial of Service or elevation of privilege. Affected Software/OS: - Microsoft SQL Server 2014 x64 Edition - Microsoft SQL Server 2012 x86/x64 Edition Service Pack 1 and prior - Microsoft SQL Server 2008 R2 x86/x64 Edition Service Pack 2 and prior - Microsoft SQL Server 2008 x86/x64 Edition Service Pack 3 and prior Solution: The vendor has released updates. Please see the references for more information. CVSS Score: 6.8 CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2014-1820 BugTraq ID: 69071 http://www.securityfocus.com/bid/69071 Microsoft Security Bulletin: MS14-044 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-044 http://www.securitytracker.com/id/1030716 http://secunia.com/advisories/60676 Common Vulnerability Exposure (CVE) ID: CVE-2014-4061 |
Copyright | Copyright (C) 2014 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |