FIX: Malformed RPC TDS Packet Causes Various AVs

Article translations Article translations
Article ID: 246612 - View products that this article applies to.
This article was previously published under Q246612
BUG #: 56866 (SQLBUG_70)
Expand all | Collapse all

On This Page

SYMPTOMS

Under rare conditions a malformed Tabular Data Stream (TDS) packet, which is submitted using Remote Procedure Call (RPC) protocol, can cause various Access Violations (AVs). The AV may result in a server shutdown if it occurs within the Open Data Services (ODS) layer. If occurring outside of ODS, the AV may cause instability that results in a server hang.

The cause of the malformed packet is usually network-layer factors such as the Network Interface Card (NIC), NIC device driver, or network router. Much less frequently it might be caused by a bug in the ODBC, OLE-DB, or DB-Library client libraries.

This hotfix improves the server-side robustness for handling these malformed packets. In some situations (but not all) it will avoid the AV. Instead you may see error 17805:
Invalid buffer received from client.

STATUS

Microsoft has confirmed this to be a problem in SQL Server 7.0. This problem has been corrected in U.S. Service Pack 2 for Microsoft SQL Server 7.0. For more information, click the following article number to view the article in the Microsoft Knowledge Base:
254561 INF: How to Obtain Service Pack 2 for Microsoft SQL Server 7.0 and Microsoft Data Engine (MSDE) 1.0
For more information, contact your primary support provider.

REFERENCES

For additional information on Tabular Data Stream (TDS), Remote Procedure Call (RPC) and Open Data Services (ODS), see SQL Server Books Online.

Properties

Article ID: 246612 - Last Review: March 14, 2006 - Revision: 2.0
APPLIES TO
  • Microsoft SQL Server 7.0 Standard Edition
Keywords: 
kbbug kbfix KB246612

Give Feedback

 

Contact us for more help

Contact us for more help
Connect with Answer Desk for expert help.
Get more support from smallbusiness.support.microsoft.com