You are currently offline, waiting for your internet to reconnect

FIX: Malformed RPC TDS Packet Causes Various AVs

This article was previously published under Q246612
This article has been archived. It is offered "as is" and will no longer be updated.
BUG #: 56866 (SQLBUG_70)
SYMPTOMS
Under rare conditions a malformed Tabular Data Stream (TDS) packet, which is submitted using Remote Procedure Call (RPC) protocol, can cause various Access Violations (AVs). The AV may result in a server shutdown if it occurs within the Open Data Services (ODS) layer. If occurring outside of ODS, the AV may cause instability that results in a server hang.

The cause of the malformed packet is usually network-layer factors such as the Network Interface Card (NIC), NIC device driver, or network router. Much less frequently it might be caused by a bug in the ODBC, OLE-DB, or DB-Library client libraries.

This hotfix improves the server-side robustness for handling these malformed packets. In some situations (but not all) it will avoid the AV. Instead you may see error 17805:
Invalid buffer received from client.
STATUS
Microsoft has confirmed this to be a problem in SQL Server 7.0. This problem has been corrected in U.S. Service Pack 2 for Microsoft SQL Server 7.0. For more information, click the following article number to view the article in the Microsoft Knowledge Base:
254561 INF: How to Obtain Service Pack 2 for Microsoft SQL Server 7.0 and Microsoft Data Engine (MSDE) 1.0
For more information, contact your primary support provider.

REFERENCES

For additional information on Tabular Data Stream (TDS), Remote Procedure Call (RPC) and Open Data Services (ODS), see SQL Server Books Online.
Properties

Article ID: 246612 - Last Review: 12/05/2015 17:35:58 - Revision: 2.0

  • Microsoft SQL Server 7.0 Standard Edition
  • kbnosurvey kbarchive kbbug kbfix KB246612
Feedback
Privacy & cookies
  • Trademarks
  • © 2015 Microsoft