Microsoft KB Archive/246612

= FIX: Malformed RPC TDS Packet Causes Various AVs =

Article ID: 246612

Article Last Modified on 3/14/2006

-

APPLIES TO


 * Microsoft SQL Server 7.0 Standard Edition

-



This article was previously published under Q246612



BUG #: 56866 (SQLBUG_70)



SYMPTOMS
Under rare conditions a malformed Tabular Data Stream (TDS) packet, which is submitted using Remote Procedure Call (RPC) protocol, can cause various Access Violations (AVs). The AV may result in a server shutdown if it occurs within the Open Data Services (ODS) layer. If occurring outside of ODS, the AV may cause instability that results in a server hang.

The cause of the malformed packet is usually network-layer factors such as the Network Interface Card (NIC), NIC device driver, or network router. Much less frequently it might be caused by a bug in the ODBC, OLE-DB, or DB-Library client libraries.

This hotfix improves the server-side robustness for handling these malformed packets. In some situations (but not all) it will avoid the AV. Instead you may see error 17805:

Invalid buffer received from client.



STATUS
Microsoft has confirmed this to be a problem in SQL Server 7.0. This problem has been corrected in U.S. Service Pack 2 for Microsoft SQL Server 7.0. For more information, click the following article number to view the article in the Microsoft Knowledge Base:

254561 INF: How to Obtain Service Pack 2 for Microsoft SQL Server 7.0 and Microsoft Data Engine (MSDE) 1.0

For more information, contact your primary support provider.