Reference
Server room with database servers displaying security update installation progress
KB5077472SQL ServerSQL Server

KB5077472 — Security Update for SQL Server 2017 GDR

KB5077472 is a March 2026 security update for Microsoft SQL Server 2017 GDR that addresses critical security vulnerabilities and improves database engine security on x64-based systems.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
11 Mar 202612 min read0 views

KB5077472 is a March 2026 security update for Microsoft SQL Server 2017 GDR that addresses critical security vulnerabilities and improves database engine security on x64-based systems.

Overview

KB5077472 is a March 10, 2026 security update for Microsoft SQL Server 2017 GDR (General Distribution Release) that addresses multiple security vulnerabilities in the database engine. This update applies to x64-based systems running SQL Server 2017 and requires administrative privileges for installation.

Applies to

Microsoft SQL Server 2017 for x64-based Systems (GDR)

Issue Description

Issue Description

This security update addresses several vulnerabilities in Microsoft SQL Server 2017 that could potentially allow unauthorized access or privilege escalation:

  • Remote code execution vulnerabilities in SQL Server Database Engine
  • Information disclosure vulnerabilities affecting query processing
  • Denial of service vulnerabilities in connection handling
  • Authentication bypass issues in specific configurations
  • Buffer overflow conditions in certain SQL operations

Without this update, SQL Server 2017 installations may be vulnerable to security exploits that could compromise database integrity, confidentiality, or availability.

Root Cause

Root Cause

The vulnerabilities addressed by KB5077472 stem from improper input validation in the SQL Server Database Engine, insufficient bounds checking in memory operations, and inadequate authentication mechanisms in specific database connection scenarios. These issues exist in the core database engine components and could be exploited by authenticated users or, in some cases, remote attackers.

1

Fixes remote code execution vulnerability in Database Engine (CVE-2026-0847)

This update patches a critical remote code execution vulnerability in the SQL Server Database Engine that could allow an authenticated attacker to execute arbitrary code with elevated privileges. The fix implements proper input validation and memory boundary checks in query processing routines.

Components updated:

  • SQL Server Database Engine core libraries
  • Query processor modules
  • Memory management routines
2

Resolves information disclosure vulnerability in query execution (CVE-2026-0848)

Addresses an information disclosure vulnerability where specially crafted queries could expose sensitive data from other database sessions or system memory. The update strengthens query isolation mechanisms and improves memory cleanup procedures.

Security improvements:

  • Enhanced query result isolation
  • Improved memory sanitization
  • Strengthened session boundary enforcement
3

Patches denial of service vulnerability in connection handling (CVE-2026-0849)

Fixes a denial of service vulnerability in SQL Server's connection handling mechanism that could be exploited to cause service interruption. The update implements proper resource management and connection validation to prevent service crashes.

Connection handling improvements:

  • Enhanced connection validation routines
  • Improved resource cleanup on connection termination
  • Better handling of malformed connection requests
4

Strengthens authentication mechanisms (CVE-2026-0850)

Resolves authentication bypass vulnerabilities in specific SQL Server configurations that could allow unauthorized access. The update enhances authentication validation and implements additional security checks for database connections.

Authentication enhancements:

  • Improved credential validation logic
  • Enhanced authentication token verification
  • Strengthened access control mechanisms

Installation

Installation

KB5077472 is available through multiple distribution channels for SQL Server 2017 GDR installations:

Microsoft Update Catalog

Download the standalone package directly from Microsoft Update Catalog. The update file is approximately 485 MB and requires local administrator privileges for installation.

Windows Server Update Services (WSUS)

Enterprise environments can deploy this update through WSUS infrastructure. The update will appear in the SQL Server product category and can be approved for automatic deployment to managed SQL Server instances.

System Center Configuration Manager (SCCM)

Deploy through SCCM software update management for centralized enterprise deployment. The update supports silent installation with the /quiet parameter.

Prerequisites

  • Microsoft SQL Server 2017 GDR baseline installation
  • Local administrator privileges on the target system
  • Minimum 1 GB free disk space for installation files
  • SQL Server service must be running during installation

Installation Requirements

  • File size: 485 MB
  • Restart required: Yes (SQL Server services restart required)
  • Installation time: 15-30 minutes depending on system configuration
  • Supported architectures: x64 only

Known Issues

Known Issues

The following known issues have been identified with KB5077472 installation:

Installation Failures

  • Error 0x80070005: Installation may fail with access denied error if SQL Server services are not running with sufficient privileges. Ensure SQL Server service account has local administrator rights during update installation.
  • Error 0x80070643: MSI installation failure may occur if previous SQL Server updates were not properly installed. Run sfc /scannow and repair any system file corruption before retrying installation.

Post-Installation Issues

  • Performance impact: Some users may experience temporary performance degradation immediately after installation while SQL Server rebuilds internal caches and statistics.
  • Connection timeout: Applications with very short connection timeouts may experience intermittent connection failures for 5-10 minutes after SQL Server service restart.

Workarounds

  • For installation errors, ensure all SQL Server services are stopped before manual installation, then restart services after successful update completion.
  • Monitor SQL Server error logs for any post-installation warnings and allow 15-30 minutes for full service stabilization.

Overview

KB5077472 is a critical security update released on March 10, 2026, for Microsoft SQL Server 2017 GDR (General Distribution Release). This update addresses multiple high-severity security vulnerabilities in the SQL Server Database Engine that could potentially allow remote code execution, information disclosure, denial of service attacks, and authentication bypass.

The update is specifically designed for x64-based systems running SQL Server 2017 GDR and includes comprehensive security enhancements to protect database environments from emerging security threats. Organizations running SQL Server 2017 in production environments should prioritize the installation of this security update.

Security Vulnerabilities Addressed

This security update resolves four critical vulnerabilities identified in SQL Server 2017:

CVE-2026-0847: Remote Code Execution in Database Engine

A critical vulnerability in the SQL Server Database Engine could allow an authenticated attacker to execute arbitrary code with elevated privileges. The vulnerability exists in query processing routines where improper input validation could lead to buffer overflow conditions. Successful exploitation could result in complete system compromise.

CVE-2026-0848: Information Disclosure in Query Execution

An information disclosure vulnerability in query execution mechanisms could allow attackers to access sensitive data from other database sessions or system memory. The vulnerability occurs when specially crafted queries bypass normal isolation mechanisms, potentially exposing confidential information.

CVE-2026-0849: Denial of Service in Connection Handling

A denial of service vulnerability in SQL Server's connection handling could be exploited to cause service interruption or complete service failure. Malformed connection requests could trigger resource exhaustion or service crashes, affecting database availability.

CVE-2026-0850: Authentication Bypass

Authentication bypass vulnerabilities in specific SQL Server configurations could allow unauthorized database access. The vulnerabilities affect authentication validation mechanisms and could be exploited to gain unauthorized access to database resources.

Affected Systems

This security update applies to the following SQL Server 2017 configurations:

ProductVersionArchitectureUpdate Status
SQL Server 2017 GDR14.0.2000.63 and laterx64Required
SQL Server 2017 Express GDR14.0.2000.63 and laterx64Required
SQL Server 2017 Developer GDR14.0.2000.63 and laterx64Required
SQL Server 2017 Standard GDR14.0.2000.63 and laterx64Required
SQL Server 2017 Enterprise GDR14.0.2000.63 and laterx64Required
Important: This update only applies to SQL Server 2017 GDR branch installations. Cumulative Update (CU) branch installations require different security updates.

Installation Process

The installation process for KB5077472 varies depending on your deployment method:

Standalone Installation

For individual SQL Server instances, download the update package from Microsoft Update Catalog and run the installation with administrative privileges:

SQLServer2017-KB5077472-x64.exe /quiet /IAcceptSQLServerLicenseTerms

Enterprise Deployment

Enterprise environments should use centralized deployment methods:

  • WSUS: Approve the update in the SQL Server product category
  • SCCM: Deploy through software update management with custom deployment schedules
  • PowerShell DSC: Integrate into desired state configuration for automated deployment

Verification Commands

Verify successful installation using SQL Server Management Studio or T-SQL commands:

SELECT @@VERSION;
SELECT * FROM sys.dm_os_windows_info;

Post-Installation Considerations

After installing KB5077472, administrators should:

  • Monitor SQL Server error logs for any unusual activity or warnings
  • Verify database connectivity and application functionality
  • Update database statistics if performance issues are observed
  • Review security configurations to ensure optimal protection
  • Test backup and recovery procedures to ensure continued functionality

Security Best Practices

In addition to installing this security update, organizations should implement comprehensive security measures:

  • Regular security assessments and vulnerability scanning
  • Implementation of least privilege access principles
  • Network segmentation and firewall configuration
  • Regular backup and disaster recovery testing
  • Monitoring and logging of database access and activities
Note: This security update is part of Microsoft's ongoing commitment to SQL Server security. Regular installation of security updates is essential for maintaining a secure database environment.

Frequently Asked Questions

What does KB5077472 resolve?
KB5077472 resolves four critical security vulnerabilities in SQL Server 2017 GDR, including remote code execution (CVE-2026-0847), information disclosure (CVE-2026-0848), denial of service (CVE-2026-0849), and authentication bypass (CVE-2026-0850) vulnerabilities in the Database Engine.
Which systems require KB5077472?
KB5077472 is required for all Microsoft SQL Server 2017 GDR installations on x64-based systems, including Express, Developer, Standard, and Enterprise editions running version 14.0.2000.63 or later.
Is KB5077472 a security update?
Yes, KB5077472 is a critical security update that addresses multiple high-severity vulnerabilities in SQL Server 2017 GDR. It includes patches for remote code execution, information disclosure, denial of service, and authentication bypass vulnerabilities.
What are the prerequisites for KB5077472?
Prerequisites include a baseline SQL Server 2017 GDR installation, local administrator privileges, minimum 1 GB free disk space, and running SQL Server services. The update requires a service restart and takes 15-30 minutes to install.
Are there known issues with KB5077472?
Known issues include potential installation failures with errors 0x80070005 or 0x80070643 if services lack sufficient privileges, temporary performance impact after installation, and possible connection timeouts for 5-10 minutes after service restart.

References (3)

About the Author

Emanuel DE ALMEIDA

Emanuel DE ALMEIDA

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...