In association with heise online

09 July 2007, 12:11

Details on vulnerabilities in SAP products

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

Security service provider NGSSoftware has published details of several vulnerabilities in SAP software products, which could be used by attackers, possibly even to gain control over servers and clients. Patches for all of these security bugs were provided three months ago. NGSSoftware releases its security advisories with a delay of three months to grant administrators sufficient time to test and install updates. Those who have not installed these updates yet, are advised to do so a.s.a.p., since publishing details on these flaws will also increase the risk of public exploits.

For instance, NGSSoftware has detected numerous bugs in the ActiveX controls installed with EnjoySAP, including buffer overflows and opportunities to create files on the affected system, although apparently not to write content into these files. EnjoySAP is a graphical user interface for SAP applications. It is about 500 MB in size and contains more than 1100 ActiveX controls.

Another hole was discovered in the web interface (WAHTTP.exe) of the SAP database; remote attackers could cause a buffer overflow by simply sending a malformed HTTP packet to the server listening on port 9999.

The SAP Message Server can also be confused by oversized HTTP requests, causing a buffer overflow and subsequent crash of the server. This hole could also be used for remote code injection and execution. According to the advisory, the bug resides in the script msgserver/html/group.

See also:

(mba)

Print Version | Send by email | Permalink: http://h-online.com/-733204
 


  • July's Community Calendar





The H Open

The H Security

The H Developer

The H Internet Toolkit