The host is installed with Microsoft SQL Server 2008, 2008 R2 or 2012 and is prone to a stack overrun vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation could allow attackers to stop responding until a manual reboot is initiated.