Executive Summary

Summary
Title SAP DB Web Server buffer overflow vulnerability
Informations
Name VU#679041 First vendor Publication 2007-07-10
Vendor VU-CERT Last vendor Modification 2007-07-16
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#679041

SAP DB Web Server buffer overflow vulnerability

Overview

The SAP Web Server contains a vulnerability that may allow an attacker to execute arbitrary code or cause a denial-of-service condition.

I. Description

SAP DB is a database server that includes a series of web-based configuration tools.

A stack based buffer overlfow exists in the SAP DB web server (WAHTTP.exe). Note that this vulnerability only affects the web server that is included with the SAP DB server. Systems hosting the SAP web tools on a different web server are not affected by this vulnerability.

II. Impact

An attacker may be able to execute arbitrary code, or create a denial-of-service condition.

III. Solution

Upgrade


According to public reports, this vulnerability is addressed in the latest version of the SAP Message Server. SAP users should contact SAP for more information.

Until a fixed version of the SAP Web Server can be deployed, the following workaround may reduce the chances of exploitation:

Restrict access

Restricting access to 9999/tcp by using access control lists or firewall rules may prevent a remote attacker from exploiting this vulnerability.

Systems Affected

VendorStatusDate Updated
SAPVulnerable10-Jul-2007

References


http://www.ngssoftware.com/advisories/critical-risk-vulnerability-in-sap-db-web-server-stack-overflow/
http://www.securityfocus.com/bid/24773
http://www.frsirt.com/english/advisories/2007/2453
http://www.securitytracker.com/id?1018341
http://secunia.com/advisories/25954
http://xforce.iss.net/xforce/xfdb/35277

Credit

Thanks to Mark Litchfield of NGS software for information that was used in this report.

This document was written by Ryan Giobbi.

Other Information

Date Public07/05/2007
Date First Published07/10/2007 03:18:45 PM
Date Last Updated07/16/2007
CERT Advisory 
CVE NameCVE-2007-3614
Metric2.98
Document Revision8

Original Source

Url : http://www.kb.cert.org/vuls/id/679041

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8

Open Source Vulnerability Database (OSVDB)

Id Description
37838 SAP DB Web Server (waHTTP.exe) sapdbwa_GetQueryString Overflow

A buffer overflow exists in SAP DB. The web server fails to validate GET requests resulting in a stack overflow. With a specially crafted request, a remote attacker can cause arbitrary code execution resulting in a loss of integrity.

Snort® IPS/IDS

Date Description
2014-01-10 SAP DB web server stack buffer overflow attempt
RuleID : 14230 - Revision : 11 - Type : SERVER-WEBAPP

Nessus® Vulnerability Scanner

Date Description
2007-07-10 Name : The remote web server is susceptible to a buffer overflow attack.
File : webdbm_dbm_intern_test_overflow.nasl - Type : ACT_GATHER_INFO