Threat Level: green Handler on Duty: Johannes Ullrich

SANS ISC: TCP/UDP Port 1433 Activity - Internet Security | DShield TCP/UDP Port 1433 Activity


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!
Loading...
Port Information
Protocol Service Name
tcp ms-sql-s Microsoft-SQL-Server
udp ms-sql-s Microsoft-SQL-Server
[get complete service list]
User Comments
Submitted By Date
Comment
Marcus H. Sachs, SANS Institute 2003-10-10 00:50:59
SANS Top-20 Entry: W2 Microsoft SQL Server (MSSQL) http://isc.sans.org/top20.html#w2 The Microsoft SQL Server (MSSQL) contains several serious vulnerabilities that allow remote attackers to obtain sensitive information, alter database content, compromise SQL servers, and, in some configurations, compromise server hosts. MSSQL vulnerabilities are well-publicized and actively under attack. Two recent MSSQL worms in May 2002 and January 2003 exploited several known MSSQL flaws. Hosts compromised by these worms generate a damaging level of network traffic when they scan for other vulnerable hosts.
Johannes Ullrich 2002-10-10 17:21:35
Port 1433 is used by Microsoft SQL Server. SQLSnake is one worm taking advantage of SQL Server installs without password. As SQL Server is able to run batch files and command line programs, it can be used to download and install malware. Basic Protection: Use good passwords for all SQL Server accounts.
Add a comment
CVE Links
CVE # Description
CVE-1999-0287
CVE-2000-1081
CVE-2000-1082
CVE-2000-1083
CVE-2000-1084
CVE-2000-1085
CVE-2000-1086
CVE-2000-1088
CVE-2001-0542
CVE-2002-0642
CVE-2010-2772