{"id":3693,"date":"2015-07-14T22:40:45","date_gmt":"2015-07-14T22:40:45","guid":{"rendered":"http:\/\/www.onomi.co.uk\/?p=3693"},"modified":"2018-08-21T11:04:05","modified_gmt":"2018-08-21T10:04:05","slug":"sql-server-patch-update-july-2015","status":"publish","type":"post","link":"http:\/\/content.n4stack.io\/2015\/07\/14\/sql-server-patch-update-july-2015\/","title":{"rendered":"SQL Server Patch Update: July 2015"},"content":{"rendered":"
Today Microsoft has released security bulletin\u00a0MS15-058 which contains an update addressing a vulnerability which could allow remote code execution. This relies on an attacker being\u00a0authenticated with\u00a0permissions to create or modify a database. The attacker would need to run a specially crafted query that is designed to execute a virtual function from a wrong leading to a function call to uninitialized memory.<\/p>\n
The update affects the following\u00a0supported editions:<\/p>\n
The security update addresses the vulnerabilities by correcting how SQL Server handles internal function calls and pointer casting. Please note that your system may require a reboot after the update.<\/p>\n