ID

VAR-201205-0127


CVE

CVE-2012-2611


TITLE

SAP NetWeaver of DiagTraceR3Info Vulnerability in arbitrary code execution in function

Trust: 0.8

sources: JVNDB: JVNDB-2012-002405

DESCRIPTION

The DiagTraceR3Info function in the Dialog processor in disp+work.exe 7010.29.15.58313 and 7200.70.18.23869 in the Dispatcher in SAP NetWeaver 7.0 EHP1 and EHP2, when a certain Developer Trace configuration is enabled, allows remote attackers to execute arbitrary code via a crafted SAP Diag packet. SAP NetWeaver is prone to a remote code-execution vulnerability and multiple denial-of-service vulnerabilities. Successfully exploiting these issues may allow an attacker to execute arbitrary code with the privileges of the user running the affected application or crash the application

Trust: 1.98

sources: NVD: CVE-2012-2611 // JVNDB: JVNDB-2012-002405 // BID: 53424 // VULMON: CVE-2012-2611

AFFECTED PRODUCTS

vendor:sapmodel:netweaverscope:eqversion:7.0

Trust: 1.6

vendor:sapmodel:netweaverscope:eqversion:7.0 ehp1 (disp+work.exe 7010.29.15.58313)

Trust: 0.8

vendor:sapmodel:netweaverscope:eqversion:7.0 ehp2 (disp+work.exe 7200.70.18.23869)

Trust: 0.8

vendor:sapmodel:netweaver ehp2scope:eqversion:7.0

Trust: 0.3

vendor:sapmodel:netweaver ehp1scope:eqversion:7.0

Trust: 0.3

sources: BID: 53424 // JVNDB: JVNDB-2012-002405 // CNNVD: CNNVD-201205-233 // NVD: CVE-2012-2611

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-2611
value: HIGH

Trust: 1.0

NVD: CVE-2012-2611
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201205-233
value: CRITICAL

Trust: 0.6

VULMON: CVE-2012-2611
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2012-2611
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

sources: VULMON: CVE-2012-2611 // JVNDB: JVNDB-2012-002405 // CNNVD: CNNVD-201205-233 // NVD: CVE-2012-2611

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.8

sources: JVNDB: JVNDB-2012-002405 // NVD: CVE-2012-2611

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201205-233

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201205-233

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-002405

EXPLOIT AVAILABILITY

sources: VULMON: CVE-2012-2611

PATCH

title:Acknowledgments to Security Researchersurl:http://scn.sap.com/docs/DOC-8218

Trust: 0.8

title:martingalloarurl:https://github.com/martingalloar/martingalloar

Trust: 0.1

title:publicationsurl:https://github.com/martingalloar/publications

Trust: 0.1

sources: VULMON: CVE-2012-2611 // JVNDB: JVNDB-2012-002405

EXTERNAL IDS

db:NVDid:CVE-2012-2611

Trust: 2.8

db:SECTRACKid:1027052

Trust: 1.1

db:JVNDBid:JVNDB-2012-002405

Trust: 0.8

db:CNNVDid:CNNVD-201205-233

Trust: 0.6

db:BIDid:53424

Trust: 0.3

db:EXPLOIT-DBid:21034

Trust: 0.1

db:VULMONid:CVE-2012-2611

Trust: 0.1

sources: VULMON: CVE-2012-2611 // BID: 53424 // JVNDB: JVNDB-2012-002405 // CNNVD: CNNVD-201205-233 // NVD: CVE-2012-2611

REFERENCES

url:http://www.coresecurity.com/content/sap-netweaver-dispatcher-multiple-vulnerabilities

Trust: 2.0

url:https://service.sap.com/sap/support/notes/1687910

Trust: 1.7

url:http://scn.sap.com/docs/doc-8218

Trust: 1.7

url:http://www.securitytracker.com/id?1027052

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2611

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-2611

Trust: 0.8

url:http://www.sap.com/platform/netweaver/index.epx

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=26830

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.exploit-db.com/exploits/21034/

Trust: 0.1

url:https://www.rapid7.com/db/modules/exploit/windows/misc/sap_netweaver_dispatcher

Trust: 0.1

sources: VULMON: CVE-2012-2611 // BID: 53424 // JVNDB: JVNDB-2012-002405 // CNNVD: CNNVD-201205-233 // NVD: CVE-2012-2611

CREDITS

Core Security - Corelabs

Trust: 0.3

sources: BID: 53424

SOURCES

db:VULMONid:CVE-2012-2611
db:BIDid:53424
db:JVNDBid:JVNDB-2012-002405
db:CNNVDid:CNNVD-201205-233
db:NVDid:CVE-2012-2611

LAST UPDATE DATE

2024-11-23T22:18:55.053000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2012-2611date:2012-08-19T00:00:00
db:BIDid:53424date:2012-09-04T05:50:00
db:JVNDBid:JVNDB-2012-002405date:2012-05-16T00:00:00
db:CNNVDid:CNNVD-201205-233date:2012-05-16T00:00:00
db:NVDid:CVE-2012-2611date:2024-11-21T01:39:18.183

SOURCES RELEASE DATE

db:VULMONid:CVE-2012-2611date:2012-05-15T00:00:00
db:BIDid:53424date:2012-05-08T00:00:00
db:JVNDBid:JVNDB-2012-002405date:2012-05-16T00:00:00
db:CNNVDid:CNNVD-201205-233date:2012-05-16T00:00:00
db:NVDid:CVE-2012-2611date:2012-05-15T04:21:43.547