ID

VAR-200704-0047


CVE

CVE-2007-1917


TITLE

SAP RFC Library of SYSTEM_CREATE_INSTANCE Buffer overflow vulnerability in functions

Trust: 0.8

sources: JVNDB: JVNDB-2007-005368

DESCRIPTION

Buffer overflow in the SYSTEM_CREATE_INSTANCE function in the SAP RFC Library 6.40 and 7.00 before 20061211 allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: This information is based upon a vague initial disclosure. Details will be updated after the grace period has ended. Few details regarding this issue are currently available. This BID will be updated as more information emerges. An attacker can exploit this issue to execute arbitrary commands over external RFC servers. Failed attempts will likely cause denial-of-service conditions. ---------------------------------------------------------------------- Secunia customers receive relevant and filtered advisories. Delivery is done via different channels including SMS, Email, Web, and https based XML feed. http://corporate.secunia.com/trial/38/request/ ---------------------------------------------------------------------- TITLE: SAP RFC Library Multiple Vulnerabilities SECUNIA ADVISORY ID: SA24722 VERIFY ADVISORY: http://secunia.com/advisories/24722/ CRITICAL: Moderately critical IMPACT: Exposure of sensitive information, DoS, System access WHERE: >From local network SOFTWARE: SAP RFC Library 7.x http://secunia.com/product/13851/ SAP RFC Library 6.x http://secunia.com/product/13850/ DESCRIPTION: Mariano Nu\xf1ez Di Croce has reported some vulnerabilities in SAP RFC Library, which can be exploited by malicious people to disclose potentially sensitive information, cause a DoS (Denial of Service), and compromise a vulnerable system. 1) The "RFC_SET_REG_SERVER_PROPERTY" RFC function allows to define the exclusive use of the RFC Server. This can be exploited to cause a DoS by denying access to other clients. 4) Two unspecified errors exist within the "RFC_START_PROGRAM" RFC function. 5) An error within the "TRUSTED_SYSTEM_SECURITY" function can be exploited to gain knowledge about existing user accounts and groups on a RFC server. The vulnerabilities are reported in SAP RFC Library versions 6.40 and 7.00. Other versions may also be affected. SOLUTION: Reportedly, SAP released patches. PROVIDED AND/OR DISCOVERED BY: Mariano Nu\xf1ez Di Croce ORIGINAL ADVISORY: http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_SAP_RFC_SET_REG_SERVER_PROPERTY_RFC_Function_Denial_of_Service.pdf http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_SAP_RFC_START_GUI_RFC_Function_Buffer_Overflow.pdf http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_SAP_RFC_START_PROGRAM_RFC_Function_Multiple_Vulnerabilities.pdf http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_SAP_SYSTEM_CREATE_INSTANCE_RFC_Function_Buffer_Overflow.pdf http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_SAP_TRUSTED_SYSTEM_SECURITY_RFC_Function_Information_Disclosure.pdf ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2007-1917 // JVNDB: JVNDB-2007-005368 // BID: 23307 // VULHUB: VHN-25279 // PACKETSTORM: 55699

AFFECTED PRODUCTS

vendor:sapmodel:rfc libraryscope:eqversion:7.0

Trust: 1.0

vendor:sapmodel:rfc libraryscope:eqversion:6.4

Trust: 1.0

vendor:sapmodel:rfc libraryscope:eqversion:6.40 20061211

Trust: 0.8

vendor:sapmodel:rfc libraryscope:ltversion:7.00

Trust: 0.8

vendor:sunmodel:solarisscope: - version: -

Trust: 0.6

vendor:sapmodel:rfc libraryscope:eqversion:7.00

Trust: 0.3

vendor:sapmodel:rfc libraryscope:eqversion:6.40

Trust: 0.3

sources: BID: 23307 // JVNDB: JVNDB-2007-005368 // CNNVD: CNNVD-200704-139 // NVD: CVE-2007-1917

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-1917
value: HIGH

Trust: 1.0

NVD: CVE-2007-1917
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200704-139
value: CRITICAL

Trust: 0.6

VULHUB: VHN-25279
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-1917
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-25279
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-25279 // JVNDB: JVNDB-2007-005368 // CNNVD: CNNVD-200704-139 // NVD: CVE-2007-1917

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-1917

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200704-139

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200704-139

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-005368

PATCH

title:Top Pageurl:http://www.sap.com/index.epx

Trust: 0.8

title:SAP RFC Library SYSTEM_CREATE_INSTANCE Repair measures for function remote overflow vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=163496

Trust: 0.6

sources: JVNDB: JVNDB-2007-005368 // CNNVD: CNNVD-200704-139

EXTERNAL IDS

db:NVDid:CVE-2007-1917

Trust: 2.5

db:BIDid:23307

Trust: 2.0

db:SECUNIAid:24722

Trust: 1.8

db:SREASONid:2536

Trust: 1.7

db:VUPENid:ADV-2007-1270

Trust: 1.7

db:JVNDBid:JVNDB-2007-005368

Trust: 0.8

db:CNNVDid:CNNVD-200704-139

Trust: 0.7

db:VULHUBid:VHN-25279

Trust: 0.1

db:PACKETSTORMid:55699

Trust: 0.1

sources: VULHUB: VHN-25279 // BID: 23307 // JVNDB: JVNDB-2007-005368 // PACKETSTORM: 55699 // CNNVD: CNNVD-200704-139 // NVD: CVE-2007-1917

REFERENCES

url:http://www.cybsec.com/vuln/cybsec-security_advisory_sap_system_create_instance_rfc_function_buffer_overflow.pdf

Trust: 1.8

url:http://www.securityfocus.com/bid/23307

Trust: 1.7

url:http://www.securityfocus.com/archive/1/464683/100/0/threaded

Trust: 1.7

url:http://secunia.com/advisories/24722

Trust: 1.7

url:http://securityreason.com/securityalert/2536

Trust: 1.7

url:http://www.vupen.com/english/advisories/2007/1270

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/33416

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-1917

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-1917

Trust: 0.8

url:http://www.sap.com

Trust: 0.3

url:/archive/1/464683

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/13850/

Trust: 0.1

url:http://corporate.secunia.com/trial/38/request/

Trust: 0.1

url:http://secunia.com/product/13851/

Trust: 0.1

url:http://www.cybsec.com/vuln/cybsec-security_advisory_sap_trusted_system_security_rfc_function_information_disclosure.pdf

Trust: 0.1

url:http://secunia.com/advisories/24722/

Trust: 0.1

url:http://www.cybsec.com/vuln/cybsec-security_advisory_sap_rfc_start_gui_rfc_function_buffer_overflow.pdf

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://www.cybsec.com/vuln/cybsec-security_advisory_sap_rfc_set_reg_server_property_rfc_function_denial_of_service.pdf

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://www.cybsec.com/vuln/cybsec-security_advisory_sap_rfc_start_program_rfc_function_multiple_vulnerabilities.pdf

Trust: 0.1

sources: VULHUB: VHN-25279 // BID: 23307 // JVNDB: JVNDB-2007-005368 // PACKETSTORM: 55699 // CNNVD: CNNVD-200704-139 // NVD: CVE-2007-1917

CREDITS

Mariano Nuñez Di Croce※ mnunez@cybsec.com

Trust: 0.6

sources: CNNVD: CNNVD-200704-139

SOURCES

db:VULHUBid:VHN-25279
db:BIDid:23307
db:JVNDBid:JVNDB-2007-005368
db:PACKETSTORMid:55699
db:CNNVDid:CNNVD-200704-139
db:NVDid:CVE-2007-1917

LAST UPDATE DATE

2024-08-14T13:59:56.818000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-25279date:2018-10-30T00:00:00
db:BIDid:23307date:2007-04-05T19:32:00
db:JVNDBid:JVNDB-2007-005368date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-200704-139date:2021-09-23T00:00:00
db:NVDid:CVE-2007-1917date:2021-09-22T14:22:17.480

SOURCES RELEASE DATE

db:VULHUBid:VHN-25279date:2007-04-10T00:00:00
db:BIDid:23307date:2007-04-04T00:00:00
db:JVNDBid:JVNDB-2007-005368date:2012-12-20T00:00:00
db:PACKETSTORMid:55699date:2007-04-07T19:35:58
db:CNNVDid:CNNVD-200704-139date:2007-04-10T00:00:00
db:NVDid:CVE-2007-1917date:2007-04-10T23:19:00