Lucene search

K
certCERTVU:679041
HistoryJul 10, 2007 - 12:00 a.m.

SAP DB Web Server buffer overflow vulnerability

2007-07-1000:00:00
www.kb.cert.org
17

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.59 Medium

EPSS

Percentile

97.8%

Overview

The SAP Web Server contains a vulnerability that may allow an attacker to execute arbitrary code or cause a denial-of-service condition.

Description

SAP DB is a database server that includes a series of web-based configuration tools.

A stack based buffer overlfow exists in the SAP DB web server (WAHTTP.exe). Note that this vulnerability only affects the web server that is included with the SAP DB server. Systems hosting the SAP web tools on a different web server are not affected by this vulnerability.


Impact

An attacker may be able to execute arbitrary code, or create a denial-of-service condition.


Solution

Upgrade

According to public reports, this vulnerability is addressed in the latest version of the SAP Message Server. SAP users should contact SAP for more information.

Until a fixed version of the SAP Web Server can be deployed, the following workaround may reduce the chances of exploitation:


Restrict access

Restricting access to 9999/tcp by using access control lists or firewall rules may prevent a remote attacker from exploiting this vulnerability.


Vendor Information

679041

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

SAP Affected

Updated: July 10, 2007

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Mark Litchfield of NGS software for information that was used in this report.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2007-3614
Severity Metric: 2.98 Date Public:

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.59 Medium

EPSS

Percentile

97.8%