Exposed sa or SQL Service Account Password

Issue

Users with access to the %windir% or %windir%\%temp% directories can potentially obtain the sa (system administrator) account passwords from the Setup.iss and Sqlstp.log files. These files may contain the Microsoft® SQL Server™ administrator password (if the server is configured to use Mixed Mode authentication) or a domain user ID and password (if the administrator chooses to provide this information to automatically start SQL Server services). Passwords in these files are stored in plaintext by SQL Server 7.0 versions prior to Service Pack 4 (SP4). All versions of SQL Server 2000 and SQL Server 7.0 SP4 encrypt the passwords before storing them.

Solution

If the unattended installation file and log files are not needed, they should be deleted. If the files must be retained, they should be moved to a folder that is only accessible by administrators, or moved to offline storage.

Additionally, the KillPwd utility provided by Microsoft can remove passwords from the Setup.iss and log files. This utility deletes any passwords that are found in the setup and log files, whether encrypted or not. It does not, by default, delete passwords in the Setup.iss file created by SQL Server 2000 installations because this file is saved in a directory that only allows access to administrators and the individual user setting up SQL Server.

Additional Information

Microsoft Security Bulletin MS02-035

FIX: Service Pack Installation May Save Standard Security Password in File (263968)

Microsoft Security Bulletin (MS00-035): Frequently Asked Questions


©2002-2004 Microsoft Corporation. All rights reserved.