MSRC_CVE-2023-21718
Vulnerability from csaf_microsoft - Published: 2023-02-14 08:00 - Updated: 2023-02-18 08:00Summary
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
Severity
Important
Notes
Additional Resources: To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle
Disclaimer: The information provided in the Microsoft Knowledge Base is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
Customer Action: Required. The vulnerability documented by this CVE requires customer action to resolve.
CWE-191
- Integer Underflow (Wrap or Wraparound)
Vendor Fix
11.0.7512.11:Security Update:https://support.microsoft.com/help/5021123
https://support.microsoft.com/help/5021123
Vendor Fix
14.0.2047.8:Security Update:https://support.microsoft.com/help/5021127
https://support.microsoft.com/help/5021127
Vendor Fix
12.0.6444.4:Security Update:https://support.microsoft.com/help/5021037
https://support.microsoft.com/help/5021037
Vendor Fix
12.0.6174.8:Security Update:https://support.microsoft.com/help/5021045
https://support.microsoft.com/help/5021045
Vendor Fix
15.0.2101.7:Security Update:https://support.microsoft.com/help/5021125
https://support.microsoft.com/help/5021125
Vendor Fix
13.0.6430.49:Security Update:https://support.microsoft.com/help/5021129
https://support.microsoft.com/help/5021129
Vendor Fix
13.0.7024.30:Security Update:https://support.microsoft.com/help/5021128
https://support.microsoft.com/help/5021128
Vendor Fix
14.0.3460.9:Security Update:https://support.microsoft.com/help/5021126
https://support.microsoft.com/help/5021126
Vendor Fix
16.0.1050.5:Security Update:https://support.microsoft.com/help/5021522
https://support.microsoft.com/help/5021522
Vendor Fix
15.0.4280.7:Security Update:https://support.microsoft.com/help/5021124
https://support.microsoft.com/help/5021124
Vendor Fix
10.50.6785.2:Security Update:https://support.microsoft.com/help/5021112
https://support.microsoft.com/help/5021112
Vendor Fix
10.0.6814.4:Security Update:https://support.microsoft.com/help/5020863
https://support.microsoft.com/help/5020863
References
Acknowledgments
Anonymous
{
"document": {
"acknowledgments": [
{
"names": [
"Anonymous"
]
}
],
"aggregate_severity": {
"namespace": "https://www.microsoft.com/en-us/msrc/security-update-severity-rating-system",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
},
{
"category": "general",
"text": "Required. The vulnerability documented by this CVE requires customer action to resolve.",
"title": "Customer Action"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2023-21718 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21718"
},
{
"category": "self",
"summary": "CVE-2023-21718 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/csaf/2023/msrc_cve-2023-21718.json"
},
{
"category": "external",
"summary": "Microsoft Exploitability Index",
"url": "https://www.microsoft.com/en-us/msrc/exploitability-index?rtc=1"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability",
"tracking": {
"current_release_date": "2023-02-18T08:00:00.000Z",
"generator": {
"date": "2025-01-01T00:40:39.921Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2023-21718",
"initial_release_date": "2023-02-14T08:00:00.000Z",
"revision_history": [
{
"date": "2023-02-14T08:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2023-02-18T08:00:00.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Updated the severity of the products in the Security Updates table. This is an informational change only."
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c11.0.7512.11",
"product": {
"name": "Microsoft SQL Server 2012 for 32-bit Systems Service Pack 4 (QFE) \u003c11.0.7512.11",
"product_id": "16"
}
},
{
"category": "product_version",
"name": "11.0.7512.11",
"product": {
"name": "Microsoft SQL Server 2012 for 32-bit Systems Service Pack 4 (QFE) 11.0.7512.11",
"product_id": "11476"
}
}
],
"category": "product_name",
"name": "Microsoft SQL Server 2012 for 32-bit Systems Service Pack 4 (QFE)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c11.0.7512.11",
"product": {
"name": "Microsoft SQL Server 2012 for x64-based Systems Service Pack 4 (QFE) \u003c11.0.7512.11",
"product_id": "15"
}
},
{
"category": "product_version",
"name": "11.0.7512.11",
"product": {
"name": "Microsoft SQL Server 2012 for x64-based Systems Service Pack 4 (QFE) 11.0.7512.11",
"product_id": "11477"
}
}
],
"category": "product_name",
"name": "Microsoft SQL Server 2012 for x64-based Systems Service Pack 4 (QFE)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c14.0.2047.8",
"product": {
"name": "Microsoft SQL Server 2017 for x64-based Systems (GDR) \u003c14.0.2047.8",
"product_id": "14"
}
},
{
"category": "product_version",
"name": "14.0.2047.8",
"product": {
"name": "Microsoft SQL Server 2017 for x64-based Systems (GDR) 14.0.2047.8",
"product_id": "11478"
}
}
],
"category": "product_name",
"name": "Microsoft SQL Server 2017 for x64-based Systems (GDR)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c12.0.6444.4",
"product": {
"name": "Microsoft SQL Server 2014 Service Pack 3 for x64-based Systems (GDR) \u003c12.0.6444.4",
"product_id": "10"
}
},
{
"category": "product_version",
"name": "12.0.6444.4",
"product": {
"name": "Microsoft SQL Server 2014 Service Pack 3 for x64-based Systems (GDR) 12.0.6444.4",
"product_id": "11667"
}
}
],
"category": "product_name",
"name": "Microsoft SQL Server 2014 Service Pack 3 for x64-based Systems (GDR)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c12.0.6444.4",
"product": {
"name": "Microsoft SQL Server 2014 Service Pack 3 for 32-bit Systems (GDR) \u003c12.0.6444.4",
"product_id": "9"
}
},
{
"category": "product_version",
"name": "12.0.6444.4",
"product": {
"name": "Microsoft SQL Server 2014 Service Pack 3 for 32-bit Systems (GDR) 12.0.6444.4",
"product_id": "11671"
}
}
],
"category": "product_name",
"name": "Microsoft SQL Server 2014 Service Pack 3 for 32-bit Systems (GDR)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c12.0.6174.8",
"product": {
"name": "Microsoft SQL Server 2014 Service Pack 3 for 32-bit Systems (CU 4) \u003c12.0.6174.8",
"product_id": "8"
}
},
{
"category": "product_version",
"name": "12.0.6174.8",
"product": {
"name": "Microsoft SQL Server 2014 Service Pack 3 for 32-bit Systems (CU 4) 12.0.6174.8",
"product_id": "11672"
}
}
],
"category": "product_name",
"name": "Microsoft SQL Server 2014 Service Pack 3 for 32-bit Systems (CU 4)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c15.0.2101.7",
"product": {
"name": "Microsoft SQL Server 2019 for x64-based Systems (GDR) \u003c15.0.2101.7",
"product_id": "7"
}
},
{
"category": "product_version",
"name": "15.0.2101.7",
"product": {
"name": "Microsoft SQL Server 2019 for x64-based Systems (GDR) 15.0.2101.7",
"product_id": "11821"
}
}
],
"category": "product_name",
"name": "Microsoft SQL Server 2019 for x64-based Systems (GDR)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c12.0.6174.8",
"product": {
"name": "Microsoft SQL Server 2014 Service Pack 3 for x64-based Systems (CU 4) \u003c12.0.6174.8",
"product_id": "6"
}
},
{
"category": "product_version",
"name": "12.0.6174.8",
"product": {
"name": "Microsoft SQL Server 2014 Service Pack 3 for x64-based Systems (CU 4) 12.0.6174.8",
"product_id": "11825"
}
}
],
"category": "product_name",
"name": "Microsoft SQL Server 2014 Service Pack 3 for x64-based Systems (CU 4)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c13.0.6430.49",
"product": {
"name": "Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR) \u003c13.0.6430.49",
"product_id": "5"
}
},
{
"category": "product_version",
"name": "13.0.6430.49",
"product": {
"name": "Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR) 13.0.6430.49",
"product_id": "12048"
}
}
],
"category": "product_name",
"name": "Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c13.0.7024.30",
"product": {
"name": "Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack \u003c13.0.7024.30",
"product_id": "4"
}
},
{
"category": "product_version",
"name": "13.0.7024.30",
"product": {
"name": "Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack 13.0.7024.30",
"product_id": "12053"
}
}
],
"category": "product_name",
"name": "Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c14.0.3460.9",
"product": {
"name": "Microsoft SQL Server 2017 for x64-based Systems (CU 31) \u003c14.0.3460.9",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "14.0.3460.9",
"product": {
"name": "Microsoft SQL Server 2017 for x64-based Systems (CU 31) 14.0.3460.9",
"product_id": "12145"
}
}
],
"category": "product_name",
"name": "Microsoft SQL Server 2017 for x64-based Systems (CU 31)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c16.0.1050.5",
"product": {
"name": "Microsoft SQL Server 2022 for x64-based Systems (GDR) \u003c16.0.1050.5",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "16.0.1050.5",
"product": {
"name": "Microsoft SQL Server 2022 for x64-based Systems (GDR) 16.0.1050.5",
"product_id": "12147"
}
}
],
"category": "product_name",
"name": "Microsoft SQL Server 2022 for x64-based Systems (GDR)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c15.0.4280.7",
"product": {
"name": "Microsoft SQL Server 2019 for x64-based Systems (CU 18) \u003c15.0.4280.7",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "15.0.4280.7",
"product": {
"name": "Microsoft SQL Server 2019 for x64-based Systems (CU 18) 15.0.4280.7",
"product_id": "12146"
}
}
],
"category": "product_name",
"name": "Microsoft SQL Server 2019 for x64-based Systems (CU 18)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.50.6785.2",
"product": {
"name": "Microsoft SQL Server 2008 R2 for x64-Based Systems Service Pack 3 (QFE) \u003c10.50.6785.2",
"product_id": "12"
}
},
{
"category": "product_version",
"name": "10.50.6785.2",
"product": {
"name": "Microsoft SQL Server 2008 R2 for x64-Based Systems Service Pack 3 (QFE) 10.50.6785.2",
"product_id": "11487"
}
}
],
"category": "product_name",
"name": "Microsoft SQL Server 2008 R2 for x64-Based Systems Service Pack 3 (QFE)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.6814.4",
"product": {
"name": "Microsoft SQL Server 2008 for 32-bit Systems Service Pack 4 (QFE) \u003c10.0.6814.4",
"product_id": "17"
}
},
{
"category": "product_version",
"name": "10.0.6814.4",
"product": {
"name": "Microsoft SQL Server 2008 for 32-bit Systems Service Pack 4 (QFE) 10.0.6814.4",
"product_id": "11474"
}
}
],
"category": "product_name",
"name": "Microsoft SQL Server 2008 for 32-bit Systems Service Pack 4 (QFE)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.6814.4",
"product": {
"name": "Microsoft SQL Server 2008 for x64-Based Systems Service Pack 4 (QFE) \u003c10.0.6814.4",
"product_id": "11"
}
},
{
"category": "product_version",
"name": "10.0.6814.4",
"product": {
"name": "Microsoft SQL Server 2008 for x64-Based Systems Service Pack 4 (QFE) 10.0.6814.4",
"product_id": "11488"
}
}
],
"category": "product_name",
"name": "Microsoft SQL Server 2008 for x64-Based Systems Service Pack 4 (QFE)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.50.6785.2",
"product": {
"name": "Microsoft SQL Server 2008 R2 for 32-Bit Systems Service Pack 3 (QFE) \u003c10.50.6785.2",
"product_id": "13"
}
},
{
"category": "product_version",
"name": "10.50.6785.2",
"product": {
"name": "Microsoft SQL Server 2008 R2 for 32-Bit Systems Service Pack 3 (QFE) 10.50.6785.2",
"product_id": "11486"
}
}
],
"category": "product_name",
"name": "Microsoft SQL Server 2008 R2 for 32-Bit Systems Service Pack 3 (QFE)"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-21718",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "general",
"text": "Microsoft",
"title": "Assigning CNA"
},
{
"category": "faq",
"text": "An attacker could exploit the vulnerability by tricking an un-authenticated user into attempting to connect to a malicious SQL server database via ODBC. This could result in the database returning malicious data that might cause arbitrary code execution on the client.",
"title": "How could an attacker exploit this vulnerability?"
}
],
"product_status": {
"fixed": [
"11474",
"11476",
"11477",
"11478",
"11486",
"11487",
"11488",
"11667",
"11671",
"11672",
"11821",
"11825",
"12048",
"12053",
"12145",
"12146",
"12147"
],
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-21718 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21718"
},
{
"category": "self",
"summary": "CVE-2023-21718 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21718"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-14T08:00:00.000Z",
"details": "11.0.7512.11:Security Update:https://support.microsoft.com/help/5021123",
"product_ids": [
"16",
"15"
],
"url": "https://support.microsoft.com/help/5021123"
},
{
"category": "vendor_fix",
"date": "2023-02-14T08:00:00.000Z",
"details": "14.0.2047.8:Security Update:https://support.microsoft.com/help/5021127",
"product_ids": [
"14"
],
"url": "https://support.microsoft.com/help/5021127"
},
{
"category": "vendor_fix",
"date": "2023-02-14T08:00:00.000Z",
"details": "12.0.6444.4:Security Update:https://support.microsoft.com/help/5021037",
"product_ids": [
"10",
"9"
],
"url": "https://support.microsoft.com/help/5021037"
},
{
"category": "vendor_fix",
"date": "2023-02-14T08:00:00.000Z",
"details": "12.0.6174.8:Security Update:https://support.microsoft.com/help/5021045",
"product_ids": [
"8",
"6"
],
"url": "https://support.microsoft.com/help/5021045"
},
{
"category": "vendor_fix",
"date": "2023-02-14T08:00:00.000Z",
"details": "15.0.2101.7:Security Update:https://support.microsoft.com/help/5021125",
"product_ids": [
"7"
],
"url": "https://support.microsoft.com/help/5021125"
},
{
"category": "vendor_fix",
"date": "2023-02-14T08:00:00.000Z",
"details": "13.0.6430.49:Security Update:https://support.microsoft.com/help/5021129",
"product_ids": [
"5"
],
"url": "https://support.microsoft.com/help/5021129"
},
{
"category": "vendor_fix",
"date": "2023-02-14T08:00:00.000Z",
"details": "13.0.7024.30:Security Update:https://support.microsoft.com/help/5021128",
"product_ids": [
"4"
],
"url": "https://support.microsoft.com/help/5021128"
},
{
"category": "vendor_fix",
"date": "2023-02-14T08:00:00.000Z",
"details": "14.0.3460.9:Security Update:https://support.microsoft.com/help/5021126",
"product_ids": [
"3"
],
"url": "https://support.microsoft.com/help/5021126"
},
{
"category": "vendor_fix",
"date": "2023-02-14T08:00:00.000Z",
"details": "16.0.1050.5:Security Update:https://support.microsoft.com/help/5021522",
"product_ids": [
"1"
],
"url": "https://support.microsoft.com/help/5021522"
},
{
"category": "vendor_fix",
"date": "2023-02-14T08:00:00.000Z",
"details": "15.0.4280.7:Security Update:https://support.microsoft.com/help/5021124",
"product_ids": [
"2"
],
"url": "https://support.microsoft.com/help/5021124"
},
{
"category": "vendor_fix",
"date": "2023-02-14T08:00:00.000Z",
"details": "10.50.6785.2:Security Update:https://support.microsoft.com/help/5021112",
"product_ids": [
"12",
"13"
],
"url": "https://support.microsoft.com/help/5021112"
},
{
"category": "vendor_fix",
"date": "2023-02-14T08:00:00.000Z",
"details": "10.0.6814.4:Security Update:https://support.microsoft.com/help/5020863",
"product_ids": [
"17",
"11"
],
"url": "https://support.microsoft.com/help/5020863"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"exploitCodeMaturity": "UNPROVEN",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"remediationLevel": "OFFICIAL_FIX",
"reportConfidence": "CONFIRMED",
"scope": "UNCHANGED",
"temporalScore": 6.8,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17"
]
}
],
"threats": [
{
"category": "impact",
"details": "Remote Code Execution"
},
{
"category": "exploit_status",
"details": "Exploited:No;Latest Software Release:Exploitation Less Likely"
}
],
"title": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…