ID

VAR-200704-0043


CVE

CVE-2007-1913


TITLE

SAP RFC Library Trusted_System_Security Function Information Disclosure Vulnerability

Trust: 0.9

sources: BID: 23305 // CNNVD: CNNVD-200704-153

DESCRIPTION

The TRUSTED_SYSTEM_SECURITY function in the SAP RFC Library 6.40 and 7.00 before 20061211 allows remote attackers to verify the existence of users and groups on systems and domains via unspecified vectors, a different vulnerability than CVE-2006-6010. NOTE: This information is based upon a vague initial disclosure. Details will be updated after the grace period has ended. SAP RFC Library is prone to an information-disclosure vulnerability. Few details regarding this issue are currently available. This BID will be updated as more information emerges. An attacker can exploit this issue to access sensitive informaiton. ---------------------------------------------------------------------- Secunia customers receive relevant and filtered advisories. Delivery is done via different channels including SMS, Email, Web, and https based XML feed. http://corporate.secunia.com/trial/38/request/ ---------------------------------------------------------------------- TITLE: SAP RFC Library Multiple Vulnerabilities SECUNIA ADVISORY ID: SA24722 VERIFY ADVISORY: http://secunia.com/advisories/24722/ CRITICAL: Moderately critical IMPACT: Exposure of sensitive information, DoS, System access WHERE: >From local network SOFTWARE: SAP RFC Library 7.x http://secunia.com/product/13851/ SAP RFC Library 6.x http://secunia.com/product/13850/ DESCRIPTION: Mariano Nu\xf1ez Di Croce has reported some vulnerabilities in SAP RFC Library, which can be exploited by malicious people to disclose potentially sensitive information, cause a DoS (Denial of Service), and compromise a vulnerable system. 1) The "RFC_SET_REG_SERVER_PROPERTY" RFC function allows to define the exclusive use of the RFC Server. This can be exploited to cause a DoS by denying access to other clients. 2) An unspecified buffer overflow exists within the "SYSTEM_CREATE_INSTANCE" RFC function, which can be exploited to execute arbitrary code. 3) An unspecified buffer overflow exists within the "RFC_START_GUI" RFC function, which can be exploited to execute arbitrary code. 4) Two unspecified errors exist within the "RFC_START_PROGRAM" RFC function. These can be exploited to gain knowledge about the RFC server's configuration or execute arbitrary code. Other versions may also be affected. SOLUTION: Reportedly, SAP released patches. PROVIDED AND/OR DISCOVERED BY: Mariano Nu\xf1ez Di Croce ORIGINAL ADVISORY: http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_SAP_RFC_SET_REG_SERVER_PROPERTY_RFC_Function_Denial_of_Service.pdf http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_SAP_RFC_START_GUI_RFC_Function_Buffer_Overflow.pdf http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_SAP_RFC_START_PROGRAM_RFC_Function_Multiple_Vulnerabilities.pdf http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_SAP_SYSTEM_CREATE_INSTANCE_RFC_Function_Buffer_Overflow.pdf http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_SAP_TRUSTED_SYSTEM_SECURITY_RFC_Function_Information_Disclosure.pdf ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2007-1913 // JVNDB: JVNDB-2007-005364 // BID: 23305 // VULHUB: VHN-25275 // PACKETSTORM: 55699

AFFECTED PRODUCTS

vendor:sapmodel:rfc libraryscope:eqversion:7.0

Trust: 1.0

vendor:sapmodel:rfc libraryscope:eqversion:6.4

Trust: 1.0

vendor:sapmodel:rfc libraryscope:eqversion:6.40 20061211

Trust: 0.8

vendor:sapmodel:rfc libraryscope:ltversion:7.00

Trust: 0.8

vendor:sunmodel:solarisscope: - version: -

Trust: 0.6

vendor:sapmodel:rfc libraryscope:eqversion:7.00

Trust: 0.3

vendor:sapmodel:rfc libraryscope:eqversion:6.40

Trust: 0.3

sources: BID: 23305 // JVNDB: JVNDB-2007-005364 // CNNVD: CNNVD-200704-153 // NVD: CVE-2007-1913

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-1913
value: MEDIUM

Trust: 1.0

NVD: CVE-2007-1913
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200704-153
value: MEDIUM

Trust: 0.6

VULHUB: VHN-25275
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2007-1913
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-25275
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-25275 // JVNDB: JVNDB-2007-005364 // CNNVD: CNNVD-200704-153 // NVD: CVE-2007-1913

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-1913

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200704-153

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200704-153

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-005364

PATCH

title:Top Pageurl:http://www.sap.com/index.epx

Trust: 0.8

title:SAP RFC Library Trusted_System_Security Repair measures for function information disclosure vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=163495

Trust: 0.6

sources: JVNDB: JVNDB-2007-005364 // CNNVD: CNNVD-200704-153

EXTERNAL IDS

db:NVDid:CVE-2007-1913

Trust: 2.5

db:BIDid:23305

Trust: 2.0

db:SECUNIAid:24722

Trust: 1.8

db:SREASONid:2535

Trust: 1.7

db:VUPENid:ADV-2007-1270

Trust: 1.7

db:JVNDBid:JVNDB-2007-005364

Trust: 0.8

db:CNNVDid:CNNVD-200704-153

Trust: 0.7

db:VULHUBid:VHN-25275

Trust: 0.1

db:PACKETSTORMid:55699

Trust: 0.1

sources: VULHUB: VHN-25275 // BID: 23305 // JVNDB: JVNDB-2007-005364 // PACKETSTORM: 55699 // CNNVD: CNNVD-200704-153 // NVD: CVE-2007-1913

REFERENCES

url:http://www.cybsec.com/vuln/cybsec-security_advisory_sap_trusted_system_security_rfc_function_information_disclosure.pdf

Trust: 1.8

url:http://www.securityfocus.com/bid/23305

Trust: 1.7

url:http://www.securityfocus.com/archive/1/464669/100/0/threaded

Trust: 1.7

url:http://secunia.com/advisories/24722

Trust: 1.7

url:http://securityreason.com/securityalert/2535

Trust: 1.7

url:http://www.vupen.com/english/advisories/2007/1270

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/33423

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1913

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-1913

Trust: 0.8

url:http://www.sap.com

Trust: 0.3

url:/archive/1/464669

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/13850/

Trust: 0.1

url:http://corporate.secunia.com/trial/38/request/

Trust: 0.1

url:http://secunia.com/product/13851/

Trust: 0.1

url:http://secunia.com/advisories/24722/

Trust: 0.1

url:http://www.cybsec.com/vuln/cybsec-security_advisory_sap_system_create_instance_rfc_function_buffer_overflow.pdf

Trust: 0.1

url:http://www.cybsec.com/vuln/cybsec-security_advisory_sap_rfc_start_gui_rfc_function_buffer_overflow.pdf

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://www.cybsec.com/vuln/cybsec-security_advisory_sap_rfc_set_reg_server_property_rfc_function_denial_of_service.pdf

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://www.cybsec.com/vuln/cybsec-security_advisory_sap_rfc_start_program_rfc_function_multiple_vulnerabilities.pdf

Trust: 0.1

sources: VULHUB: VHN-25275 // BID: 23305 // JVNDB: JVNDB-2007-005364 // PACKETSTORM: 55699 // CNNVD: CNNVD-200704-153 // NVD: CVE-2007-1913

CREDITS

Mariano Nuñez Di Croce※ mnunez@cybsec.com

Trust: 0.6

sources: CNNVD: CNNVD-200704-153

SOURCES

db:VULHUBid:VHN-25275
db:BIDid:23305
db:JVNDBid:JVNDB-2007-005364
db:PACKETSTORMid:55699
db:CNNVDid:CNNVD-200704-153
db:NVDid:CVE-2007-1913

LAST UPDATE DATE

2024-11-23T21:57:14.543000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-25275date:2018-10-30T00:00:00
db:BIDid:23305date:2007-04-05T19:32:00
db:JVNDBid:JVNDB-2007-005364date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-200704-153date:2021-09-23T00:00:00
db:NVDid:CVE-2007-1913date:2024-11-21T00:29:27.073

SOURCES RELEASE DATE

db:VULHUBid:VHN-25275date:2007-04-10T00:00:00
db:BIDid:23305date:2007-04-04T00:00:00
db:JVNDBid:JVNDB-2007-005364date:2012-12-20T00:00:00
db:PACKETSTORMid:55699date:2007-04-07T19:35:58
db:CNNVDid:CNNVD-200704-153date:2007-04-10T00:00:00
db:NVDid:CVE-2007-1913date:2007-04-10T23:19:00