ID

VAR-201704-1577


CVE

CVE-2017-7696


TITLE

SAP AS JAVA SSO Authentication Library Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2017-003212

DESCRIPTION

SAP AS JAVA SSO Authentication Library 2.0 through 3.0 allow remote attackers to cause a denial of service (memory consumption) via large values in the width and height parameters to otp_logon_ui_resources/qr, aka SAP Security Note 2389042. SAP Single Sign On is prone to a denial-of-service vulnerability. An attacker can exploit this issue to cause denial-of-service conditions

Trust: 1.89

sources: NVD: CVE-2017-7696 // JVNDB: JVNDB-2017-003212 // BID: 95363

AFFECTED PRODUCTS

vendor:sapmodel:sso authentication libraryscope:eqversion:2.0

Trust: 1.6

vendor:sapmodel:sso authentication libraryscope:eqversion:3.0

Trust: 1.6

vendor:sapmodel:as java sso authentication libraryscope:eqversion:2.0 to 3.0

Trust: 0.8

vendor:sapmodel:single sign onscope:eqversion:0

Trust: 0.3

vendor:sapmodel:netweaver application server javascope:eqversion:0

Trust: 0.3

vendor:sapmodel:netweaverscope:eqversion:0

Trust: 0.3

sources: BID: 95363 // JVNDB: JVNDB-2017-003212 // CNNVD: CNNVD-201704-559 // NVD: CVE-2017-7696

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-7696
value: HIGH

Trust: 1.0

NVD: CVE-2017-7696
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201704-559
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2017-7696
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

nvd@nist.gov: CVE-2017-7696
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: JVNDB: JVNDB-2017-003212 // CNNVD: CNNVD-201704-559 // NVD: CVE-2017-7696

PROBLEMTYPE DATA

problemtype:CWE-770

Trust: 1.0

problemtype:CWE-399

Trust: 0.8

sources: JVNDB: JVNDB-2017-003212 // NVD: CVE-2017-7696

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201704-559

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201704-559

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-003212

PATCH

title:Top Pageurl:https://www.sap.com/japan/index.html

Trust: 0.8

title:SAP AS JAVA SSO Authentication Library Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=69192

Trust: 0.6

sources: JVNDB: JVNDB-2017-003212 // CNNVD: CNNVD-201704-559

EXTERNAL IDS

db:NVDid:CVE-2017-7696

Trust: 2.7

db:BIDid:95363

Trust: 0.9

db:JVNDBid:JVNDB-2017-003212

Trust: 0.8

db:CNNVDid:CNNVD-201704-559

Trust: 0.6

sources: BID: 95363 // JVNDB: JVNDB-2017-003212 // CNNVD: CNNVD-201704-559 // NVD: CVE-2017-7696

REFERENCES

url:https://erpscan.com/advisories/erpscan-17-001-sap-java-dos-bc-iam-sso-otp-package-use-qr-servlet/

Trust: 1.7

url:https://erpscan.io/advisories/erpscan-17-001-sap-java-dos-bc-iam-sso-otp-package-use-qr-servlet/

Trust: 1.6

url:http://www.sap.com

Trust: 0.9

url:https://www.onapsis.com/blog/sap-security-notes-january-2017-continued-security-focus-sap-defense

Trust: 0.9

url:https://launchpad.support.sap.com/#/notes/2389042

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-7696

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-7696

Trust: 0.8

url:https://www.securityfocus.com/bid/95363

Trust: 0.6

sources: BID: 95363 // JVNDB: JVNDB-2017-003212 // CNNVD: CNNVD-201704-559 // NVD: CVE-2017-7696

CREDITS

Onapsis Research Labs

Trust: 0.9

sources: BID: 95363 // CNNVD: CNNVD-201704-559

SOURCES

db:BIDid:95363
db:JVNDBid:JVNDB-2017-003212
db:CNNVDid:CNNVD-201704-559
db:NVDid:CVE-2017-7696

LAST UPDATE DATE

2024-11-23T21:54:21.884000+00:00


SOURCES UPDATE DATE

db:BIDid:95363date:2019-04-12T21:00:00
db:JVNDBid:JVNDB-2017-003212date:2017-05-19T00:00:00
db:CNNVDid:CNNVD-201704-559date:2019-10-23T00:00:00
db:NVDid:CVE-2017-7696date:2024-11-21T03:32:29.137

SOURCES RELEASE DATE

db:BIDid:95363date:2017-01-10T00:00:00
db:JVNDBid:JVNDB-2017-003212date:2017-05-19T00:00:00
db:CNNVDid:CNNVD-201704-559date:2017-04-12T00:00:00
db:NVDid:CVE-2017-7696date:2017-04-14T18:59:01.080