SAP Business One 2005 6.80.320 Remote Buffer Overflow

2010.08.27
Credit: mikey27
Risk: High
Local: No
Remote: Yes
CWE: CWE-119


Ogólna skala CVSS: 10/10
Znaczenie: 10/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Pełny
Wpływ na integralność: Pełny
Wpływ na dostępność: Pełny

Product: SAP Business One 2005 Vulnerable: SAP Business One 2005 A (6.80.123) SP:00 PL:06 SAP Business One 2005 A (6.80.320) SP:01 PL:34 (Likely all 2005 versions are affected) Not Vulnerable: SAP Business One 2007 Discovered By: Mike Arnold Information: NT_Naming_Service.exe (part of the License Manager for SAP Business One 2005) is vulnerable to a stack-based remote buffer overflow allowing for full system compromise by an unauthenticated user that has TCP/IP access to SAP's license service on TCP port 30000. Sending a large GIOP request will cause a buffer overflow allowing for remote code execution. NT_Naming_Service.exe runs with SYSTEM level privledges Confirmed & Tested Vulnerable SAP Business One versions: 2005 A (6.80.123) SP:00 PL:06 (On Windows Server 2003 R2 Standard SP2) 2005 A (6.80.320) SP:01 PL:34 (On Windows Server 2003 R2 Enterprise SP2) Proof of Concept exploit ---> http://www.milw0rm.com/exploits/9319 . The vendor has been notified, no patch has yet been released.

Referencje:

http://xforce.iss.net/xforce/xfdb/52256
http://www.vupen.com/english/advisories/2009/2170
http://www.securitytracker.com/id?1022655
http://www.securityfocus.com/bid/35933
http://www.securityfocus.com/archive/1/archive/1/505489/100/0/threaded
http://secunia.com/advisories/36103


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top