The information in this article applies to:
BUG# NT: 10191 (6.00) SYMPTOMS
Invalid syntax when you build an EXECUTE statement from a local
variable can cause a thread access violation (AV).
CAUSE
The error occurs when the EXECUTE statement treats an oversized buffer
(more then 30 characters) as a stored procedure name instead of as a
specific Transact-SQL command due to the use of invalid syntax for the
EXECUTE statement itself.
The behavior can be altered by changing the variable declarations.
The behavior does not change if you use a valid stored procedure name, such as sp_who; char(128)continues to cause an access violation, and char(30) continues to execute successfully. This is because char(30) is a valid length for an object identifier. WORKAROUND
STATUSMicrosoft has confirmed this to be a problem in Microsoft SQL Server version 6.0. This problem was corrected in Service Pack 1 for SQL Server version 6.0. For more information, contact your primary support provider. Additional query words: sql6 Windows NT
Keywords : kbother kbbug6.00 kbfix6.00.sp1 SSrvWinNT |
Last Reviewed: April 21, 1999 © 2000 Microsoft Corporation. All rights reserved. Terms of Use. |