Risk: Medium
Local: No
Remote: Yes
CWE: CWE-Other

CVSS Base Score: 5/10
Impact Subscore: 2.9/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: None
Integrity impact: None
Availability impact: Partial

(The following pre-advisory is also available in PDF format for download at: ER_PROPERTY_RFC_Function_Denial_of_Service.pdf ) CYBSEC S.A. Pre-Advisory Name: SAP RFC_SET_REG_SERVER_PROPERTY RFC Function Denial Of Service ================== Vulnerability Class: Denial Of Service ==================== Release Date: 2007-04-03 ============= Affected Applications: ====================== . SAP RFC Library 6.40 . SAP RFC Library 7.00 Affected Platforms: =================== . AIX 32bit . AIX 64bit . HP-UX on IA64 64bit . HP-UX on PA-RISC 64bit . Linux on IA32 32bit . Linux on IA64 64bit . Linux on Power 64bit . Linux on x86_64 64bit . Linux on zSeries 64bit . Mac OS . OS/400 . OS/400 V5R2M0 . Reliant 32bit . Solaris on SPARC 32bit . Solaris on SPARC 64bit . Solaris on x64_64 64bit . TRU64 64bit . Windows Server on IA32 32bit . Windows Server on IA64 64bit . Windows Server on x64 64bit . z/OS 32bit Local / Remote: Remote =============== Severity: Medium ========= Author: Mariano Nu&#241;ez Di Croce ======= Vendor Status: Confirmed. Updates Released. ============== Reference to Vulnerability Disclosure Policy: ============================================= Product Overview: ================= "The RFC Library offers an interface to a SAP System. The RFC Library is the most commonly used and installed component of existing SAP Software. This interface provides the opportunity to call any RFC Function in a SAP System from an external application. Moreover, the RFC Library offers the possibility to write a RFC Server Program, which is accessible from any SAP System or external application. Most SAP Connectors use the RFC Library as communication platform to SAP Systems." RFC_SET_REG_SERVER_PROPERTY RFC function is used to set properties of externally registered RFC servers. This function is installed by default in every external RFC server. Vulnerability Description: ========================== This function allows defining the exclusive use of an external registered RFC server, denying access to other clients. Technical Details: ================== Technical details will be released three months after publication of this pre-advisory. This was agreed upon with SAP to allow their customers to upgrade affected software prior to technical knowledge been publicly available. Impact: ======= This vulnerability may allow an attacker to remotely prevent licit clients to connect with external RFC servers. Solutions: ========== SAP has released patches to address this vulnerability. Affected customers should apply the patches immediately. More information can be found on SAP Note 1005397. Vendor Response: ================ . 2006-11-21: Initial Vendor Contact. . 2006-12-01: Vendor Confirmed Vulnerability. . 2007-01-09: Vendor Releases Update for version 6.40. . 2007-01-09: Vendor Releases Update for version 7.00. . 2007-04-03: Pre-Advisory Public Disclosure. Special Thanks: =============== Thanks goes to Victor Montero and Gustavo Kunst. Contact Information: ==================== For more information regarding the vulnerability feel free to contact the author at mnunez <at> cybsec <dot> com. About CYBSEC S.A. Security Systems ----------------------------------- Since 1996 CYBSEC S.A. is devoted exclusively to provide professional services specialized in Computer Security. More than 150 clients around the globe validate our quality and professionalism. To keep objectivity, CYBSEC S.A. does not represent, neither sell, nor is associated with other software and/or hardware provider companies. Our services are strictly focused on Information Security, protecting our clients from emerging security threats, mantaining their IT deployments available, safe, and reliable. Beyond professional services, CYBSEC is continuosly researching new defense and attack techiniques and contributing with the security community with high quality information exchange. For more information, please visit -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFGE59hvWPewvmdrSgRApToAJ9FWP2Tolkb9l1Y48PaX/IUFmxwjQCgl5tg SfC+04musYB/6KmY6ocdQqc= =MUrs -----END PGP SIGNATURE-----

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2023,


Back to Top