Mark Litchfield, from NGSSoftware, has done it again. This time he has discovered a vulnerability in SAP DB.

Description:
Mark Litchfield has reported a vulnerability in SAP DB, which can be exploited by malicious people to compromise a vulnerable system.

The vulnerability is caused due to a boundary error within waHTTP.exe and can be exploited to cause a stack-based buffer overflow via a specially crafted HTTP request to default port 9999/TCP.

Successful exploitation allows execution of arbitrary code, but requires that SAP DB is installed to run on its own web server.

Solution:
Update to the latest version.

Provided and/or discovered by:
Mark Litchfield, NGSSoftware

Original Advisory:
http://www.ngssoftware.com/advisories…-in-sap-db-web-server-stack-overflow/

Article Link

[tags]SAP DB Vulnerabilty, Mark Litchfield, Buffer Overflow[/tags]

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.