ID

VAR-201704-0066


CVE

CVE-2016-10311


TITLE

SAP NetWeaver Vulnerable to stack-based buffer overflow

Trust: 0.8

sources: JVNDB: JVNDB-2016-008363

DESCRIPTION

Stack-based buffer overflow in SAP NetWeaver 7.0 through 7.5 allows remote attackers to cause a denial of service () by sending a crafted packet to the SAPSTARTSRV port, aka SAP Security Note 2295238. SAP NetWeaver Contains a stack-based buffer overflow vulnerability. SAP NetWeaver is prone to a remote buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed exploit attempts may result in a denial-of-service condition

Trust: 1.89

sources: NVD: CVE-2016-10311 // JVNDB: JVNDB-2016-008363 // BID: 91734

AFFECTED PRODUCTS

vendor:sapmodel:netweaverscope:eqversion:7.5

Trust: 1.9

vendor:sapmodel:netweaverscope:eqversion:7.4

Trust: 1.9

vendor:sapmodel:netweaverscope:eqversion:7.3

Trust: 1.9

vendor:sapmodel:netweaverscope:eqversion:7.0

Trust: 1.9

vendor:sapmodel:netweaverscope:eqversion:7.0 to 7.5

Trust: 0.8

vendor:sapmodel:netweaverscope:eqversion:7.2

Trust: 0.3

vendor:sapmodel:netweaverscope:eqversion:7.1

Trust: 0.3

sources: BID: 91734 // JVNDB: JVNDB-2016-008363 // CNNVD: CNNVD-201704-481 // NVD: CVE-2016-10311

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-10311
value: CRITICAL

Trust: 1.0

NVD: CVE-2016-10311
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201704-481
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2016-10311
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

nvd@nist.gov: CVE-2016-10311
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: JVNDB: JVNDB-2016-008363 // CNNVD: CNNVD-201704-481 // NVD: CVE-2016-10311

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

sources: JVNDB: JVNDB-2016-008363 // NVD: CVE-2016-10311

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201704-481

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201704-481

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-008363

PATCH

title:Top Pageurl:https://www.sap.com/index.html

Trust: 0.8

title:SAP NetWeaver Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=69175

Trust: 0.6

sources: JVNDB: JVNDB-2016-008363 // CNNVD: CNNVD-201704-481

EXTERNAL IDS

db:NVDid:CVE-2016-10311

Trust: 2.7

db:JVNDBid:JVNDB-2016-008363

Trust: 0.8

db:CNNVDid:CNNVD-201704-481

Trust: 0.6

db:BIDid:91734

Trust: 0.3

sources: BID: 91734 // JVNDB: JVNDB-2016-008363 // CNNVD: CNNVD-201704-481 // NVD: CVE-2016-10311

REFERENCES

url:https://erpscan.com/advisories/erpscan-16-030-sap-netweaver-sapstartsrv-stack-based-buffer-overflow/

Trust: 1.7

url:https://erpscan.io/advisories/erpscan-16-030-sap-netweaver-sapstartsrv-stack-based-buffer-overflow/

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-10311

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2016-10311

Trust: 0.8

url:http://www.sap.com

Trust: 0.3

url:www.sap.com/platform/netweaver

Trust: 0.3

url:https://service.sap.com/sap/support/notes/2295238

Trust: 0.3

url:https://erpscan.com/press-center/blog/sap-cyber-threat-intelligence-report-july-2016/

Trust: 0.3

sources: BID: 91734 // JVNDB: JVNDB-2016-008363 // CNNVD: CNNVD-201704-481 // NVD: CVE-2016-10311

CREDITS

Dmitry Yudin (ERPScan)

Trust: 0.3

sources: BID: 91734

SOURCES

db:BIDid:91734
db:JVNDBid:JVNDB-2016-008363
db:CNNVDid:CNNVD-201704-481
db:NVDid:CVE-2016-10311

LAST UPDATE DATE

2024-11-23T22:42:12.701000+00:00


SOURCES UPDATE DATE

db:BIDid:91734date:2017-04-11T00:04:00
db:JVNDBid:JVNDB-2016-008363date:2017-05-16T00:00:00
db:CNNVDid:CNNVD-201704-481date:2017-04-11T00:00:00
db:NVDid:CVE-2016-10311date:2024-11-21T02:43:45.610

SOURCES RELEASE DATE

db:BIDid:91734date:2016-07-12T00:00:00
db:JVNDBid:JVNDB-2016-008363date:2017-05-16T00:00:00
db:CNNVDid:CNNVD-201704-481date:2017-04-11T00:00:00
db:NVDid:CVE-2016-10311date:2017-04-10T15:59:00.300