MS server port under hack attack

Discussion in 'other security issues & news' started by spy1, May 21, 2002.

Thread Status:
Not open for further replies.
  1. spy1

    spy1 Registered Member

    Joined:
    Dec 29, 2002
    Posts:
    3,139
    Location:
    Clover, SC
    "By James Middleton [21-05-2002]

    Administrators should check SQL server security

    Security watchers have warned of a huge increase in the number of connection attempts made on port 1433, the Microsoft SQL server port, in the last 24 hours.

    An advisory released this morning by security firm Trend Micro said that the significant increase in connection attempts could signify hack attacks.

    The company said that firewall logs at customer sites revealed that the attacks started to rocket yesterday (May 20).

    Indeed, a quick glance at the "top ten ports under attack" list on the Sans Institute's Internet Storm Centre website shows port 1433 at number five.

    Connection attempts on the Microsoft SQL server port usually number between zero and three per cent, according to the Internet Storm Centre, but yesterday they leapt into the red at 57 per cent.

    "The connection attempts look like a hacking attack; at first a MSSQL handshake is transferred, which is not unusual," said the Trend Micro advisory. "But afterwards, a second packet is sent, and this packet is an attempt to login to the MSSQL server, using the account name 'sa' and an empty password. This is the default authentication set-up for MSSQL installation."

    Neither the source of these attacks nor the motives behind them have yet been determined. But the increase in attacks on port 1433 should serve as a warning to administrators to check the security of SQL server installations.

    On 17 April, Microsoft issued an advisory about an unchecked buffer in extended procedure functions in the SQL server that could have allowed attackers to run arbitrary code on the system.

    It is possible that this latest attack could have been carried out by someone looking to exploit this vulnerability."
     
  2. spy1

    spy1 Registered Member

    Joined:
    Dec 29, 2002
    Posts:
    3,139
    Location:
    Clover, SC
    http://www.theregus.com/content/55/25019.html

    http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/default.asp (use IE to view).

    https://gtoc.iss.net/index.php

    (This is basically an NT/W2k issue for people involved with SQL servers - SYSADMINS, IOW).
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.