Security Update for SQL Server 2012 Through 2019 (CVE-2021-1636)

Introduction

On January 12, 2021, Microsoft released a security update for SQL Server 2012, SQL Server 2014, SQL Server 2016, SQL Server 2017, and SQL Server 2019. This Security Update is for SQL Server 2012 through 2019 (CVE-2021-1636).

I first noticed this when I saw Windows Update offering up a SQL Server 2019 Security update on my main workstation this morning. Remember, today is Patch Tuesday!

Security Update for SQL Server 2012 Through 2019 (CVE-2021-1636)
Windows Update

Depending on how your machine is configured, it might automatically download and install this update as part of the normal automated Patch Tuesday process. It also can happen if you manually check Windows Update. That is probably ok for a workstation, but is not something you want happening on a production SQL Server instance. It is much better to manually control when a SQL Server patch like this is installed on a production instance.

Just to be clear, installing this update is very similar to installing a regular SQL Server Cumulative Update. Whatever method is used to install it, the SQL Server service is going to stop and then be restarted. This will cause an outage for SQL Server, just like you would see when installing a SQL Server Cumulative Update. If you have an HA solution in place, there are ways to minimize the length of the outage.

KB4583468 – Microsoft SQL Server elevation of privilege vulnerability

In KB4583468, Microsoft describes the issue:

Data can be sent over a network to an affected Microsoft SQL Server instance that may cause code to run against the SQL Server process if a certain extended event is enabled. See CVE-2021-1636 for detailed information.

KB4583468 – Microsoft SQL Server elevation of privilege vulnerability

What Patch Do You Need?

Because of how Microsoft classifies SQL Server servicing branches, there are nine different patches for this issue. One for each supported branch. The GDR branch is for organizations that do not install SQL Server Cumulative Updates, while the CU branch is for organizations that do install cumulative updates. Only security updates go into the GDR branch, while CU branches get other bug fixes and feature enhancements.

These nine different patches are linked below. This link has a table that helps you determine which patch to apply based on your current SQL Server build number.

Keep in mind, if you are on a GDR branch, and you install a CU patch, you will then be on a CU branch. Also remember that these patches are only available for supported branches of SQL Server 2012 through SQL Server 2019.

What that means is that if you are still on the SQL Server 2016 SP1 or SQL Server 2016 RTM branches, there is no security patch for you, because those branches are no longer supported. You will have to install SQL Server 2016 SP2, and then install the appropriate security patch on top of that.

Both SQL Server 2014 and SQL Server 2012 are out of Mainstream Support, but they are still in Extended Support. That means they get security updates like this. You will also need to be on the latest Service Pack for those versions in order to get this security update.

Here is Microsoft’s current guidance about the Modern Servicing Model for SQL Server:

Final Words

I think you should try to deploy this update as soon as possible after you have been able to test it.

If you have any questions about this post, please ask me here in the comments or on Twitter. I am pretty active on Twitter as GlennAlanBerryThanks for reading!

29 thoughts on “Security Update for SQL Server 2012 Through 2019 (CVE-2021-1636)

  1. Extended Events go back to SQL 2008 which is no longer supported. For Microsoft to reach back to SQL 2012 could mean that maybe the problem exists all the way back to one of the original 253 events created. If that was the case this could explain why NO CU’s got released since late September/ early October.

    My source for the number of events is https://www.mytecbits.com/microsoft/sql-server/what-are-extended-events

    1. Maybe. The official explanation (which I have no reason to disbelieve) is that the scheduled November/December CUs were delayed in order to take some pressure off the Microsoft employees during the holidays.

      Hopefully we will hear some information about when the regular CU release schedule will resume.

      1. I’m starting to think that something big has happened or is happening because we have had no CU’s for 3 months now. The employees could be getting overwhelmed with them all working remotely or another security fix is in the works (next Tuesday is Patch Tuesday). I expect we should hear something soon as this must affect the patching cycle for the versions in Mainstream support.

  2. Hi Glenn, Thanks for posting this info.
    Just a heads up regarding KB4583457 – I just installed this update via Windows Update and it took it upon itself to restart all of the SQL Services without warning! I can’t see any mention of this anywhere in the documentation for this update, so was somewhat embarrassing on a production server.

    1. Well, this is essentially the same as installing a SQL Server Cumulative Update, so it is always going to stop and restart the SQL Server Service. I guess I should have made that more explicit in my post.

      Installing this via Windows Update is not the best way to do it on a Production machine. Installing it manually will do the same thing.

  3. Hi Glenn, I noticed the same update released today; we’re actually in the middle of updating a set of related 2014 instances where I work and I was just checking that the list of SP’s, CU’s and patches was still correct.

    One thing that’s bothering me with this one is the bit that says “if a certain extended event is enabled”. I can’t see anywhere in the documentation from MS *which* extended event is the one that allows the vulnerability to work, so I can’t check to see if any of our instances have it enabled. Any ideas which it is?

  4. Hi Glenn ,
    Good after noon.
    I have below question
    We have SQL Server 2014 instance and i installed below sequence
    Step 1 SQL Server 2014 RTM RTM
    Step 2 SQL Server 2014 Service Pack 3 (SP3) Latest SP
    Step 3 Security update for SQL Server 2014 SP3 CU4: June 14, 2022 CVE-2022-29143

    In this scenario covered all CVE (Common Vulnerabilities and Exposures) ?

    In our IT team Scan server and detected CVE Vulnerabilities issue ( past CVE )

    Thanks & Regards,
    Vipul Shah

  5. Hi Glenn,

    In this scenario covered all CVE (Common Vulnerabilities and Exposures) ?

    In our IT team Scan server and detected CVE Vulnerabilities issue ( past CVE )
    How to resolved past Vulnerabilities issue ?

    1. You have already asked this question. You already have the latest public build of SQL Server 2014. There is nothing more you can do with SQL Server 2014 (which is out of Mainstream Support from Microsoft).

      If that is not good enough for your I.T. Team, then you should upgrade to a newer version of SQL Server.

Please tell me what you think

Discover more from Glenn's SQL Server Performance

Subscribe now to keep reading and get access to the full archive.

Continue reading