Microsoft KB Archive/246612

From BetaArchive Wiki
< Microsoft KB Archive
Revision as of 16:13, 18 July 2020 by 3155ffGd (talk | contribs) (importing KB archive)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Knowledge Base


FIX: Malformed RPC TDS Packet Causes Various AVs

Article ID: 246612

Article Last Modified on 3/14/2006



APPLIES TO

  • Microsoft SQL Server 7.0 Standard Edition



This article was previously published under Q246612

BUG #: 56866 (SQLBUG_70)

SYMPTOMS

Under rare conditions a malformed Tabular Data Stream (TDS) packet, which is submitted using Remote Procedure Call (RPC) protocol, can cause various Access Violations (AVs). The AV may result in a server shutdown if it occurs within the Open Data Services (ODS) layer. If occurring outside of ODS, the AV may cause instability that results in a server hang.

The cause of the malformed packet is usually network-layer factors such as the Network Interface Card (NIC), NIC device driver, or network router. Much less frequently it might be caused by a bug in the ODBC, OLE-DB, or DB-Library client libraries.

This hotfix improves the server-side robustness for handling these malformed packets. In some situations (but not all) it will avoid the AV. Instead you may see error 17805:

Invalid buffer received from client.

STATUS

Microsoft has confirmed this to be a problem in SQL Server 7.0. This problem has been corrected in U.S. Service Pack 2 for Microsoft SQL Server 7.0. For more information, click the following article number to view the article in the Microsoft Knowledge Base:

254561 INF: How to Obtain Service Pack 2 for Microsoft SQL Server 7.0 and Microsoft Data Engine (MSDE) 1.0


For more information, contact your primary support provider.

REFERENCES

For additional information on Tabular Data Stream (TDS), Remote Procedure Call (RPC) and Open Data Services (ODS), see SQL Server Books Online.

Keywords: kbbug kbfix KB246612