Microsoft SQL Server Agent scheduled jobs could create malicious output files

mssql-agent-create-files (10257) The risk level is classified as MediumMedium Risk


Microsoft SQL Server 2000, Microsoft Desktop Engine (MSDE) 2000, Microsoft SQL Server 7.0, and Microsoft Data Engine (MSDE) 1.0 could allow a remote attacker with SQL server privileges to create malicious files on the system. This vulnerability is caused by improper permissions used by the SQL Server Agent when scheduled jobs create output files. A remote attacker could create a scheduled job that would produce a malicious output file when the SQL Server Agent processes the job. This output file would be created with privileges of the SQL Server Agent. An attacker could use this program to cause a denial of service or execute commands on the system.

Note: This vulnerability also affects Cisco CallManager version 3.3(x), Cisco Unity versions 3.x and 4.x, and Cisco Building Broadband Service Manager versions 5.0 and 5.1, which incorporate the use of either SQL Server 2000 or MSDE 2000.


Gain Access


Apply the appropriate patch for your system, as listed in Microsoft Security Bulletin MS03-031. See References.

Note: Microsoft originally provided a patch for this vulnerability in MS02-056, but it was superseded by the patch released with MS02-061, and then superseded by the patch released with MS03-031.

For Cisco CallManager, Cisco Unity, and Cisco Building Broadband Service Manager: Refer to Cisco Security Advisory 2003 January 26 05:30 GMT for upgrade or patch information. See References.


Platforms Affected:

  • Cisco Building Broadband Service Manager 5.0
  • Cisco Building Broadband Service Manager 5.1
  • Cisco Unified CallManager 3.3
  • Cisco Unity Server 3.0
  • Cisco Unity Server 4.0
  • Microsoft Data Engine 1.0
  • Microsoft Data Engine 2000
  • Microsoft SQL Server 2000
  • Microsoft SQL Server 7.0


Oct 02, 2002

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page