ID

VAR-200803-0282


CVE

CVE-2008-0307


TITLE

SAP MaxDB of vserver Integer sign error vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2008-005381

DESCRIPTION

Integer signedness error in vserver in SAP MaxDB 7.6.0.37, and possibly other versions, allows remote attackers to execute arbitrary code via unknown vectors that trigger heap corruption. SAP MaxDB is prone to a heap-based memory-corruption vulnerability. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Successfully exploiting this issue will compromise the affected application and possibly the underlying computer. This issue affects MaxDB 7.6.0.37 running on the Linux operating system. Other versions running on different platforms may also be affected. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: MaxDB Multiple Vulnerabilities SECUNIA ADVISORY ID: SA29312 VERIFY ADVISORY: http://secunia.com/advisories/29312/ CRITICAL: Highly critical IMPACT: Privilege escalation, System access WHERE: >From remote SOFTWARE: MaxDB 7.x http://secunia.com/product/4012/ DESCRIPTION: Some vulnerabilities have been reported in MaxDB, which can be exploited by malicious, local users to gain escalated privileges, and by malicious people to potentially compromise a vulnerable system. 2) An error exists within the "sdbstarter" program when handling environment variables. Successful exploitation requires that the attacker is a member of the "sdba" group. PROVIDED AND/OR DISCOVERED BY: An anonymous researcher, reported via iDefense. ORIGINAL ADVISORY: iDefense: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=670 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=669 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. iDefense Security Advisory 03.10.08 http://labs.idefense.com/intelligence/vulnerabilities/ Mar 10, 2008 I. BACKGROUND SAP's MaxDB is a database software product. MaxDB was released as open source from version 7.5 up to version 7.6.00. Later versions are no longer open source but are available for download from the SAP SDN website (sdn.sap.com) as a community edition with free community support for public use beyond the scope of SAP applications. The "vserver" program is responsible for accepting and handling communication with remote database clients. For more information, visit the product's website at the following URL. https://www.sdn.sap.com/irj/sdn/maxdb II. After accepting a connection, the "vserver" process forks and reads parameters from the client into various structures. When doing so, it trusts values sent from the client to be valid. By sending a specially crafted request, an attacker can cause heap corruption. This leads to a potentially exploitable memory corruption condition. III. In order to exploit this vulnerability, an attacker must be able to establish a TCP session on port 7210 with the target host. Additionally, the attacker must know the name of an active database on the server. Since this service uses the fork() system call once a connection has been accepted, an attacker can repeatedly attempt to exploit this vulnerability. Some exploitation attempts may result in the database process ceasing to run, in which case further exploitation attempts will not be possible. IV. DETECTION iDefense has confirmed the existence of this vulnerability in SAP AG's MaxDB version 7.6.0.37 on Linux. V. WORKAROUND Employing firewalls to limit access to the affected service will mitigate exposure to this vulnerability. VI. VENDOR RESPONSE SAP AG has addressed this vulnerability by releasing a new version of MaxDB. For more information, consult SAP note 1140135. VII. CVE INFORMATION The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2008-0307 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org/), which standardizes names for security problems. VIII. DISCLOSURE TIMELINE 12/06/2007 Initial vendor notification 12/10/2007 Initial vendor response 03/10/2008 Coordinated public disclosure IX. CREDIT The discoverer of this vulnerability wishes to remain anonymous. Get paid for vulnerability research http://labs.idefense.com/methodology/vulnerability/vcp.php Free tools, research and upcoming events http://labs.idefense.com/ X. LEGAL NOTICES Copyright \xa9 2008 iDefense, Inc. Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDefense. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please e-mail customerservice@idefense.com for permission. Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Trust: 2.07

sources: NVD: CVE-2008-0307 // JVNDB: JVNDB-2008-005381 // BID: 28183 // PACKETSTORM: 64375 // PACKETSTORM: 64480

AFFECTED PRODUCTS

vendor:sapmodel:maxdbscope:eqversion:7.6.0.37

Trust: 2.7

sources: BID: 28183 // JVNDB: JVNDB-2008-005381 // CNNVD: CNNVD-200803-177 // NVD: CVE-2008-0307

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-0307
value: HIGH

Trust: 1.0

NVD: CVE-2008-0307
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200803-177
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2008-0307
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2008-005381 // CNNVD: CNNVD-200803-177 // NVD: CVE-2008-0307

PROBLEMTYPE DATA

problemtype:CWE-189

Trust: 1.8

sources: JVNDB: JVNDB-2008-005381 // NVD: CVE-2008-0307

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 64480 // CNNVD: CNNVD-200803-177

TYPE

digital error

Trust: 0.6

sources: CNNVD: CNNVD-200803-177

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-005381

PATCH

title:Top Pageurl:http://maxdb.sap.com/

Trust: 0.8

sources: JVNDB: JVNDB-2008-005381

EXTERNAL IDS

db:NVDid:CVE-2008-0307

Trust: 2.8

db:BIDid:28183

Trust: 1.9

db:SECUNIAid:29312

Trust: 1.7

db:VUPENid:ADV-2008-0844

Trust: 1.6

db:SECTRACKid:1019571

Trust: 1.6

db:JVNDBid:JVNDB-2008-005381

Trust: 0.8

db:IDEFENSEid:20080310 SAP MAXDB SIGNEDNESS ERROR HEAP CORRUPTION VULNERABILITY

Trust: 0.6

db:XFid:41107

Trust: 0.6

db:CNNVDid:CNNVD-200803-177

Trust: 0.6

db:PACKETSTORMid:64375

Trust: 0.1

db:PACKETSTORMid:64480

Trust: 0.1

sources: BID: 28183 // JVNDB: JVNDB-2008-005381 // PACKETSTORM: 64375 // PACKETSTORM: 64480 // CNNVD: CNNVD-200803-177 // NVD: CVE-2008-0307

REFERENCES

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=669

Trust: 2.0

url:http://www.securitytracker.com/id?1019571

Trust: 1.6

url:http://www.securityfocus.com/bid/28183

Trust: 1.6

url:http://secunia.com/advisories/29312

Trust: 1.6

url:http://www.vupen.com/english/advisories/2008/0844/references

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/41107

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0307

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-0307

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/41107

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2008/0844/references

Trust: 0.6

url:https://www.sdn.sap.com/irj/sdn/maxdb

Trust: 0.4

url:/archive/1/489357

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/4012/

Trust: 0.1

url:https://psi.secunia.com/?page=changelog

Trust: 0.1

url:https://psi.secunia.com/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=670

Trust: 0.1

url:http://secunia.com/advisories/29312/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://cve.mitre.org/),

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:http://labs.idefense.com/intelligence/vulnerabilities/

Trust: 0.1

url:http://labs.idefense.com/methodology/vulnerability/vcp.php

Trust: 0.1

url:http://labs.idefense.com/

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-0307

Trust: 0.1

sources: BID: 28183 // JVNDB: JVNDB-2008-005381 // PACKETSTORM: 64375 // PACKETSTORM: 64480 // CNNVD: CNNVD-200803-177 // NVD: CVE-2008-0307

CREDITS

iDEFENSE

Trust: 0.6

sources: CNNVD: CNNVD-200803-177

SOURCES

db:BIDid:28183
db:JVNDBid:JVNDB-2008-005381
db:PACKETSTORMid:64375
db:PACKETSTORMid:64480
db:CNNVDid:CNNVD-200803-177
db:NVDid:CVE-2008-0307

LAST UPDATE DATE

2024-11-23T22:28:09.919000+00:00


SOURCES UPDATE DATE

db:BIDid:28183date:2008-03-12T17:21:00
db:JVNDBid:JVNDB-2008-005381date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-200803-177date:2008-09-05T00:00:00
db:NVDid:CVE-2008-0307date:2024-11-21T00:41:38.243

SOURCES RELEASE DATE

db:BIDid:28183date:2008-03-10T00:00:00
db:JVNDBid:JVNDB-2008-005381date:2012-12-20T00:00:00
db:PACKETSTORMid:64375date:2008-03-12T17:55:23
db:PACKETSTORMid:64480date:2008-03-13T00:29:44
db:CNNVDid:CNNVD-200803-177date:2008-03-11T00:00:00
db:NVDid:CVE-2008-0307date:2008-03-11T23:44:00