Mark Litchfield, from NGSSoftware, has done it again. This time he has discovered a vulnerability in SAP DB.
Description:
Mark Litchfield has reported a vulnerability in SAP DB, which can be exploited by malicious people to compromise a vulnerable system.The vulnerability is caused due to a boundary error within waHTTP.exe and can be exploited to cause a stack-based buffer overflow via a specially crafted HTTP request to default port 9999/TCP.
Successful exploitation allows execution of arbitrary code, but requires that SAP DB is installed to run on its own web server.
Solution:
Update to the latest version.Provided and/or discovered by:
Mark Litchfield, NGSSoftwareOriginal Advisory:
http://www.ngssoftware.com/advisories…-in-sap-db-web-server-stack-overflow/
[tags]SAP DB Vulnerabilty, Mark Litchfield, Buffer Overflow[/tags]