Microsoft KB Archive/246612

From BetaArchive Wiki
Knowledge Base

FIX: Malformed RPC TDS Packet Causes Various AVs

Article ID: 246612

Article Last Modified on 3/14/2006


  • Microsoft SQL Server 7.0 Standard Edition

This article was previously published under Q246612

BUG #: 56866 (SQLBUG_70)


Under rare conditions a malformed Tabular Data Stream (TDS) packet, which is submitted using Remote Procedure Call (RPC) protocol, can cause various Access Violations (AVs). The AV may result in a server shutdown if it occurs within the Open Data Services (ODS) layer. If occurring outside of ODS, the AV may cause instability that results in a server hang.

The cause of the malformed packet is usually network-layer factors such as the Network Interface Card (NIC), NIC device driver, or network router. Much less frequently it might be caused by a bug in the ODBC, OLE-DB, or DB-Library client libraries.

This hotfix improves the server-side robustness for handling these malformed packets. In some situations (but not all) it will avoid the AV. Instead you may see error 17805:

Invalid buffer received from client.


Microsoft has confirmed this to be a problem in SQL Server 7.0. This problem has been corrected in U.S. Service Pack 2 for Microsoft SQL Server 7.0. For more information, click the following article number to view the article in the Microsoft Knowledge Base:

254561 INF: How to Obtain Service Pack 2 for Microsoft SQL Server 7.0 and Microsoft Data Engine (MSDE) 1.0

For more information, contact your primary support provider.


For additional information on Tabular Data Stream (TDS), Remote Procedure Call (RPC) and Open Data Services (ODS), see SQL Server Books Online.

Keywords: kbbug kbfix KB246612