{"vuid":"VU#679041","idnumber":"679041","name":"SAP DB Web Server buffer overflow vulnerability","keywords":["SAP DB","Web Server","stack based buffer overflow","waHTTP.exe"],"overview":"The SAP Web Server contains a vulnerability that may allow an attacker to execute arbitrary code or cause a denial-of-service condition.","clean_desc":"SAP DB is a database server that includes a series of web-based configuration tools. A stack based buffer overlfow exists in the SAP DB web server (WAHTTP.exe). Note that this vulnerability only affects the web server that is included with the SAP DB server. Systems hosting the SAP web tools on a different web server are not affected by this vulnerability.","impact":"An attacker may be able to execute arbitrary code or create a denial-of-service condition.","resolution":"Upgrade\nAccording to public reports, this vulnerability is addressed in the latest version of the SAP Message Server. SAP users should contact SAP for more information. Until a fixed version of the SAP Web Server can be deployed, the following workaround may reduce the chances of exploitation:","workarounds":"Restrict access Restricting access to 9999/tcp by using access control lists or firewall rules may prevent a remote attacker from exploiting this vulnerability.","sysaffected":"","thanks":"Thanks to Mark Litchfield of NGS software for information that was used in this report.","author":"This document was written by Ryan Giobbi.","public":["http://www.ngssoftware.com/advisories/critical-risk-vulnerability-in-sap-db-web-server-stack-overflow/","http://www.securityfocus.com/bid/24773","http://www.frsirt.com/english/advisories/2007/2453","http://www.securitytracker.com/id?1018341","http://secunia.com/advisories/25954","http://xforce.iss.net/xforce/xfdb/35277"],"cveids":["CVE-2007-3614"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-07-05T19:06:21Z","publicdate":"2007-07-05T00:00:00Z","datefirstpublished":"2007-07-10T19:18:45Z","dateupdated":"2007-07-16T15:18:36Z","revision":9,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"19","cam_exploitation":"0","cam_internetinfrastructure":"7","cam_population":"3","cam_impact":"17","cam_easeofexploitation":"6","cam_attackeraccessrequired":"20","cam_scorecurrent":"2.9835","cam_scorecurrentwidelyknown":"3.09825","cam_scorecurrentwidelyknownexploited":"5.39325","ipprotocol":"tcp","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":2.9835,"vulnote":null}