New Phishing Campaign Bypasses Security Using Corrupted Word Documents – Active IOCs
December 2, 2024Multiple D-Link DIR-605L Vulnerabilities
December 2, 2024New Phishing Campaign Bypasses Security Using Corrupted Word Documents – Active IOCs
December 2, 2024Multiple D-Link DIR-605L Vulnerabilities
December 2, 2024Severity
High
Analysis Summary
CVE-2024-49013 CVSS:8.8
Microsoft SQL Server could allow a remote attacker to execute arbitrary code on the system, caused by an error in the Native Client. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2024-49011 CVSS:8.8
Microsoft SQL Server could allow a remote attacker to execute arbitrary code on the system, caused by an error in the Native Client. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2024-49010 CVSS:8.8
Microsoft SQL Server could allow a remote attacker to execute arbitrary code on the system, caused by an error in the Native Client. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2024-49007 CVSS:8.8
Microsoft SQL Server could allow a remote attacker to execute arbitrary code on the system, caused by an error in the Native Client. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to execute arbitrary code on the system.
Impact
- Code Execution
Indicators of Compromise
CVE
- CVE-2024-49013
- CVE-2024-49011
- CVE-2024-49010
- CVE-2024-49007
Affected Vendors
Affected Products
- Microsoft SQL Server 2017 (GDR) - 14.0.0
- Microsoft SQL Server 2019 (GDR) - 15.0.0
- Microsoft SQL Server 2016 Service Pack 3 (GDR) - 13.0.0
- Microsoft SQL Server 2016 Service Pack 3 Azure Connect Feature Pack - 13.0.0
- Microsoft SQL Server 2019 (CU 29) - 15.0.0
Remediation
Use Microsoft Automatic Update to apply the appropriate patch for your system, or the Microsoft Security Update Guide to search for available patches.