Both releases come just days after a zero-day flaw impacting SQL Server 2000 and Microsoft Internet Information Services (IIS) servers emerged.
The flaw, as described by Austria-based SEC Consult advisory, makes it possible for hackers to target the vulnerability remotely on Web sites that link search boxes, customer databases or other Web apps to SQL Server. According to the advisory, the SQL vulnerability can be exploited by an authenticated user with a direct database connection, or via SQL injection in a vulnerable Web application. SEC Consult came to this conclusion after successfully executing arbitrary code on one of its lab machines.
Microsoft is still investigating the flaw, but -- unlike the recently discovered zero-day Internet Explorer bug -- as of Tuesday there were no reports of the vulnerability being exploited in the wild.
However, the release of these tools (designed to complement a previous workaround released in June) comes amid alarming growth in SQL Server injection attacks. Expert say such attacks exploit security vulnerabilities and insert malicious code into a database serving as the back-end of any Web site. While it may not be as urgent as fixing as IE, recovering from a SQL injection attack can be difficult. There are numerous cases of Web site owners cleaning up their database only to be hit again a few hours later because a replicating attack mechanism is written into the coding and can't be wiped off by rebooting or via anti-virus software, as other exploits can.
Microsoft Ups Exploit Code Warning
Fortinet Helps DBAs Sniff Out DB Exploits
Paramore’s ‘Twilight’ Song ‘Decode’ Premieres On Stephenie Meyer’s Web Site