Vulnerabilities > CVE-2019-0819 - Unspecified vulnerability in Microsoft SQL Server 2017

047910
CVSS 6.5 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
LOW
Confidentiality impact
HIGH
Integrity impact
NONE
Availability impact
NONE
network
low complexity
microsoft
nessus

Summary

An information disclosure vulnerability exists in Microsoft SQL Server Analysis Services when it improperly enforces metadata permissions, aka 'Microsoft SQL Server Analysis Services Information Disclosure Vulnerability'.

Vulnerable Configurations

Part Description Count
Application
Microsoft
1

Nessus

  • NASL familyWindows : Microsoft Bulletins
    NASL idSMB_NT_MS19_MAY_MSSQL.NASL
    descriptionThe Microsoft SQL Server installation on the remote host is missing a security update. It is, therefore, affected by an information disclosure vulnerability that exists in Microsoft SQL Server Analysis Services when it improperly enforces metadata permissions. An attacker who successfully exploited the vulnerability could query tables or columns for which they do not have access rights.
    last seen2020-06-01
    modified2020-06-02
    plugin id125070
    published2019-05-14
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125070
    titleSecurity Updates for Microsoft SQL Server (May 2019)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from the Microsoft Security Updates API. The text
    # itself is copyright (C) Microsoft Corporation.
    #
    include("compat.inc");
    
    if (description)
    {
      script_id(125070);
      script_version("1.4");
      script_cvs_date("Date: 2019/10/30 13:24:47");
    
      script_cve_id("CVE-2019-0819");
      script_xref(name:"MSKB", value:"4494352");
      script_xref(name:"MSKB", value:"4494351");
      script_xref(name:"MSFT", value:"MS19-4494352");
      script_xref(name:"MSFT", value:"MS19-4494351");
    
      script_name(english:"Security Updates for Microsoft SQL Server (May 2019)");
      script_summary(english:"Checks for Microsoft security updates.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The Microsoft SQL Server installation on the remote host is affected by an information disclosure vulnerability.");
      script_set_attribute(attribute:"description", value:
    "The Microsoft SQL Server installation on the remote host is
    missing a security update. It is, therefore, affected by an
    information disclosure vulnerability that exists in Microsoft SQL
    Server Analysis Services when it improperly enforces metadata
    permissions. An attacker who successfully exploited the vulnerability
    could query tables or columns for which they do not have access
    rights.");
      # https://support.microsoft.com/en-us/help/4494352/security-update-for-sql-server-2017-cu-14-gdr-may-14-2019
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?6a9e279b");
      # https://support.microsoft.com/en-us/help/4494351/description-of-the-security-update-for-sql-server-2017-gdr-may-14-2019
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?7fa2d0e0");
      script_set_attribute(attribute:"solution", value:
    "Microsoft has released the following security updates to address this issue:  
      -KB4494352
      -KB4494351");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-0819");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2019/05/14");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/05/14");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/05/14");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:sql_server");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows : Microsoft Bulletins");
    
      script_copyright(english:"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("smb_hotfixes.nasl", "mssql_version.nasl", "smb_enum_services.nasl", "ms_bulletin_checks_possible.nasl");
      script_require_keys("SMB/MS_Bulletin_Checks/Possible");
      script_require_ports(139, 445, 1433, "Services/mssql", "Host/patch_management_checks");
    
      exit(0);
    }
    
    include("audit.inc");
    include("smb_func.inc");
    include("smb_hotfixes.inc");
    include("smb_hotfixes_fcheck.inc");
    include("misc_func.inc");
    
    get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");
    
    bulletin = 'MS19-05';
    kbs = make_list(
      "4494351",
      "4494352"
    );
    
    if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);
    
    get_kb_item_or_exit("SMB/Registry/Enumerated");
    get_kb_item_or_exit("SMB/WindowsVersion", exit_code:1);
    
    ver_list = get_kb_list("mssql/installs/*/SQLVersion");
    
    if (isnull(ver_list)) audit(AUDIT_NOT_INST, "Microsoft SQL Server");
    
    program_files_dir = hotfix_get_programfilesdir();
    setup_2017_path= program_files_dir + "\Microsoft SQL Server\140\Setup Bootstrap\SQL2017";
    
    foreach item (keys(ver_list))
    {
      item -= '/SQLVersion';
      arch = get_kb_item(item + "/arch");
      if (arch != "x64") continue;
      item -= 'mssql/installs/';
      sqlpath = item;
    
      share = hotfix_path2share(path:sqlpath);
      if (!is_accessible_share(share:share)) continue;
    
      version = get_kb_item("mssql/installs/" + sqlpath + "/SQLVersion");
    
      # continue if not SQL Server 2017
      if (version !~ "^14\.0\.") continue;
    
      if (
        # 2017 GDR
        hotfix_is_vulnerable(path:setup_2017_path, file:"setup.exe", version:"2017.0140.2014.14", min_version:"2017.140.1000.169", bulletin:bulletin, kb:'4494351') ||
        # 2017 CU
        hotfix_is_vulnerable(path:setup_2017_path, file:"setup.exe", version:"2017.0140.3103.01", min_version:"2017.140.3006.16", bulletin:bulletin, kb:'4494352')
      )
      {
        vuln++;
      }
    }
    hotfix_check_fversion_end();
    
    if (vuln)
    {
      replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);
      hotfix_security_warning();
      exit(0);
    }
    else
    {
      audit(AUDIT_HOST_NOT, 'affected');
    }
    
  • NASL familyWindows
    NASL idSMB_NT_MS19_MAY_MSSQL_REMOTE.NASL
    descriptionThe Microsoft SQL Server installation on the remote host is missing a security update. It is, therefore, affected by an information disclosure vulnerability that exists in Microsoft SQL Server Analysis Services when it improperly enforces metadata permissions. An attacker who successfully exploited the vulnerability could query tables or columns for which they do not have access rights.
    last seen2020-06-01
    modified2020-06-02
    plugin id125057
    published2019-05-14
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125057
    titleSecurity Updates for Microsoft SQL Server (May 2019)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from the Microsoft Security Updates API. The text
    # itself is copyright (C) Microsoft Corporation.
    #
    include("compat.inc");
    
    if (description)
    {
      script_id(125057);
      script_version("1.5");
      script_cvs_date("Date: 2020/02/12");
    
      script_cve_id("CVE-2019-0819");
      script_xref(name:"MSKB", value:"4494352");
      script_xref(name:"MSKB", value:"4494351");
      script_xref(name:"MSFT", value:"MS19-4494352");
      script_xref(name:"MSFT", value:"MS19-4494351");
    
      script_name(english:"Security Updates for Microsoft SQL Server (May 2019)");
      script_summary(english:"Checks for Microsoft security updates.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The Microsoft SQL Server installation on the remote host is affected by an information disclosure vulnerability.");
      script_set_attribute(attribute:"description", value:
    "The Microsoft SQL Server installation on the remote host is
    missing a security update. It is, therefore, affected by an
    information disclosure vulnerability that exists in  Microsoft SQL
    Server Analysis Services when it improperly enforces metadata
    permissions. An attacker who successfully exploited the vulnerability
    could query tables or columns for which they do not have access
    rights.");
      # https://support.microsoft.com/en-us/help/4494352/security-update-for-sql-server-2017-cu-14-gdr-may-14-2019
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?6a9e279b");
      # https://support.microsoft.com/en-us/help/4494351/description-of-the-security-update-for-sql-server-2017-gdr-may-14-2019
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?7fa2d0e0");
      script_set_attribute(attribute:"solution", value:
    "Microsoft has released the following security updates to address this issue:  
      -KB4494352
      -KB4494351");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-0819");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2019/05/14");
      script_set_attribute(attribute:"patch_publication_date", value:"2019/05/14");
      script_set_attribute(attribute:"plugin_publication_date", value:"2019/05/14");
    
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:sql_server");
      script_set_attribute(attribute:"potential_vulnerability", value:"true");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows");
    
      script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("mssqlserver_detect.nasl");
      script_require_keys("Settings/ParanoidReport");
      script_require_ports(139, 445, 1433, "Services/mssql", "Host/patch_management_checks");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    
    if (report_paranoia < 2)
      audit(AUDIT_PARANOID);
    
    port = get_service(svc:"mssql", exit_on_fail:TRUE);
    instance = get_kb_item("MSSQL/" + port + "/InstanceName");
    version = get_kb_item_or_exit("MSSQL/" + port + "/Version");
    
    ver = pregmatch(pattern:"^([0-9.]+)([^0-9]|$)", string:version);
    if(!isnull(ver) && !isnull(ver[1])) ver = ver[1];
    
    if (
        # 2017 GDR
        ver_compare(minver:"14.0.1000.0", ver:ver, fix:"14.0.2014.14", strict:FALSE) < 0 ||
        # 2017 CU
        ver_compare(minver:"14.0.3006.0", ver:ver, fix:"14.0.3103.1", strict:FALSE) < 0
    )
    {
      report = '';
      if(!empty_or_null(version)) report += '\n  SQL Server Version   : ' + version;
      if(!empty_or_null(instance)) report += '\n  SQL Server Instance  : ' + instance;
      security_report_v4(port:port, extra:report, severity:SECURITY_WARNING);
    }
    else audit(AUDIT_INST_VER_NOT_VULN, "MSSQL", version);