ID

VAR-200808-0238


CVE

CVE-2008-1810


TITLE

Linux Run on SAP MaxDB of dbmsrv Vulnerability gained in

Trust: 0.8

sources: JVNDB: JVNDB-2008-005690

DESCRIPTION

Untrusted search path vulnerability in dbmsrv in SAP MaxDB 7.6.03.15 on Linux allows local users to gain privileges via a modified PATH environment variable. SAP MaxDB is prone to a local privilege-escalation vulnerability that occurs in the 'dbmsrv' process because the application fails to sufficiently sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary code with 'sdb:sdba' privileges. Successfully exploiting this issue will compromise the affected application and possibly the underlying computer. SAP MaxDB 7.6.03.15 on Linux is vulnerable; other versions running on different platforms may also be affected. ---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ International Partner Manager - Project Sales in the IT-Security Industry: http://corporate.secunia.com/about_secunia/64/ ---------------------------------------------------------------------- TITLE: MaxDB "dbmsrv" Privilege Escalation Vulnerability SECUNIA ADVISORY ID: SA31318 VERIFY ADVISORY: http://secunia.com/advisories/31318/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system SOFTWARE: MaxDB 7.x http://secunia.com/product/4012/ DESCRIPTION: A vulnerability has been reported in MaxDB, which can be exploited by malicious, local users to gain escalated privileges. PROVIDED AND/OR DISCOVERED BY: anonymous researcher, reported via iDefense ORIGINAL ADVISORY: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=729 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. iDefense Security Advisory 07.30.08 http://labs.idefense.com/intelligence/vulnerabilities/ Jul 30, 2008 I. BACKGROUND SAP's MaxDB is a database software product. MaxDB was released as open source from version 7.5 up to version 7.6.00. Later versions are no longer open source but are available for download from the SAP SDN website (sdn.sap.com) as a community edition with free community support for public use beyond the scope of SAP applications. The "dbmsrv" program is set-uid "sdb", set-gid "sdba", and installed by default. For more information, visit the product's website at the following URL. https://www.sdn.sap.com/irj/sdn/maxdb II. When a local user runs the "dbmcli" program, the MaxDB executes a "dbmsrv" process on the user's behalf. The "dbmsrv" process, which is responsible for executing user commands, runs as the user "sdb" with group "sdba". III. IV. Other versions may also be vulnerable. V. WORKAROUND iDefense is currently unaware of any workaround for this issue. VI. VENDOR RESPONSE SAP AG has addressed this vulnerability by releasing a new version of MaxDB. For more information, consult SAP note 1178438. VII. CVE INFORMATION The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2008-1810 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org/), which standardizes names for security problems. VIII. DISCLOSURE TIMELINE 03/27/2008 Initial vendor notification 04/01/2008 Initial vendor response 07/30/2008 Coordinated public disclosure IX. CREDIT The discoverer of this vulnerability wishes to remain anonymous. Get paid for vulnerability research http://labs.idefense.com/methodology/vulnerability/vcp.php Free tools, research and upcoming events http://labs.idefense.com/ X. LEGAL NOTICES Copyright \xa9 2008 iDefense, Inc. Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDefense. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please e-mail customerservice@idefense.com for permission. Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information

Trust: 2.07

sources: NVD: CVE-2008-1810 // JVNDB: JVNDB-2008-005690 // BID: 30474 // PACKETSTORM: 68727 // PACKETSTORM: 68694

AFFECTED PRODUCTS

vendor:sapmodel:maxdbscope:eqversion:7.6.03.15

Trust: 2.1

vendor:linuxmodel:kernelscope: - version: -

Trust: 0.6

sources: BID: 30474 // JVNDB: JVNDB-2008-005690 // CNNVD: CNNVD-200808-004 // NVD: CVE-2008-1810

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-1810
value: MEDIUM

Trust: 1.0

NVD: CVE-2008-1810
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200808-004
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2008-1810
severity: MEDIUM
baseScore: 4.4
vectorString: AV:L/AC:M/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.4
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2008-005690 // CNNVD: CNNVD-200808-004 // NVD: CVE-2008-1810

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.8

sources: JVNDB: JVNDB-2008-005690 // NVD: CVE-2008-1810

THREAT TYPE

local

Trust: 1.1

sources: BID: 30474 // PACKETSTORM: 68727 // PACKETSTORM: 68694 // CNNVD: CNNVD-200808-004

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-200808-004

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-005690

PATCH

title:Top Pageurl:http://maxdb.sap.com/

Trust: 0.8

sources: JVNDB: JVNDB-2008-005690

EXTERNAL IDS

db:NVDid:CVE-2008-1810

Trust: 2.8

db:BIDid:30474

Trust: 1.9

db:SECUNIAid:31318

Trust: 1.7

db:SECTRACKid:1020585

Trust: 1.6

db:VUPENid:ADV-2008-2267

Trust: 1.6

db:JVNDBid:JVNDB-2008-005690

Trust: 0.8

db:IDEFENSEid:20080730 SAP MAXDB DBMSRV UNTRUSTED EXECUTION PATH VULNERABILITY

Trust: 0.6

db:XFid:44125

Trust: 0.6

db:CNNVDid:CNNVD-200808-004

Trust: 0.6

db:PACKETSTORMid:68727

Trust: 0.1

db:PACKETSTORMid:68694

Trust: 0.1

sources: BID: 30474 // JVNDB: JVNDB-2008-005690 // PACKETSTORM: 68727 // PACKETSTORM: 68694 // CNNVD: CNNVD-200808-004 // NVD: CVE-2008-1810

REFERENCES

url:http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=729

Trust: 2.0

url:http://www.securitytracker.com/id?1020585

Trust: 1.6

url:http://www.securityfocus.com/bid/30474

Trust: 1.6

url:http://secunia.com/advisories/31318

Trust: 1.6

url:http://www.vupen.com/english/advisories/2008/2267/references

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/44125

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1810

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-1810

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/44125

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2008/2267/references

Trust: 0.6

url:https://www.sdn.sap.com/irj/sdn/maxdb

Trust: 0.4

url:/archive/1/494990

Trust: 0.3

url:http://secunia.com/product/4012/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://secunia.com/advisories/31318/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/secunia_security_specialist/

Trust: 0.1

url:http://corporate.secunia.com/about_secunia/64/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://cve.mitre.org/),

Trust: 0.1

url:http://labs.idefense.com/intelligence/vulnerabilities/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-1810

Trust: 0.1

url:http://labs.idefense.com/methodology/vulnerability/vcp.php

Trust: 0.1

url:http://labs.idefense.com/

Trust: 0.1

sources: BID: 30474 // JVNDB: JVNDB-2008-005690 // PACKETSTORM: 68727 // PACKETSTORM: 68694 // CNNVD: CNNVD-200808-004 // NVD: CVE-2008-1810

CREDITS

iDEFENSE

Trust: 0.6

sources: CNNVD: CNNVD-200808-004

SOURCES

db:BIDid:30474
db:JVNDBid:JVNDB-2008-005690
db:PACKETSTORMid:68727
db:PACKETSTORMid:68694
db:CNNVDid:CNNVD-200808-004
db:NVDid:CVE-2008-1810

LAST UPDATE DATE

2024-08-14T15:45:16.532000+00:00


SOURCES UPDATE DATE

db:BIDid:30474date:2008-07-31T22:07:00
db:JVNDBid:JVNDB-2008-005690date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-200808-004date:2008-09-11T00:00:00
db:NVDid:CVE-2008-1810date:2017-08-08T01:30:28.387

SOURCES RELEASE DATE

db:BIDid:30474date:2008-07-31T00:00:00
db:JVNDBid:JVNDB-2008-005690date:2012-12-20T00:00:00
db:PACKETSTORMid:68727date:2008-08-01T19:48:32
db:PACKETSTORMid:68694date:2008-07-31T22:25:13
db:CNNVDid:CNNVD-200808-004date:2008-07-31T00:00:00
db:NVDid:CVE-2008-1810date:2008-08-01T14:41:00