CVE-2008-0307 |
|
发布时间 :2008-03-11 19:44:00 | ||
修订时间 :2011-03-07 22:04:18 | ||||
NMCOPS |
[原文]Integer signedness error in vserver in SAP MaxDB 7.6.0.37, and possibly other versions, allows remote attackers to execute arbitrary code via unknown vectors that trigger heap corruption.
[CNNVD]SAP MaxDB vserver组件远程堆溢出漏洞(CNNVD-200803-177)
MaxDB是SAP应用中广泛使用的数据库管理系统。
MaxDB的vserver组件存在符号错误,远程攻击者可能利用此漏洞导致服务器不可用。
接受连接后,vserver进程会将从客户端读取的参数fork为各种结构,在这个过程中信任客户端所发送的值为有效。如果客户端发送了特制的请求的话,就可能触发堆溢出,导致内存破坏。
如果要利用这个漏洞,攻击者必须能在7210端口上与目标主机创建TCP会话,此外还需要知道服务器上活动数据库的名称。由于vserver服务在接受连接后使用fork()系统调用,因此攻击者可以反复利用这个漏洞,一些攻击尝试会导致数据库进程停止运行。
–
CVSS (基础分值)
CVSS分值: | 9.3 | [严重(HIGH)] |
机密性影响: | COMPLETE | [完全的信息泄露导致所有系统文件暴露] |
完整性影响: | COMPLETE | [系统完整性可被完全破坏] |
可用性影响: | COMPLETE | [可能导致系统完全宕机] |
攻击复杂度: | MEDIUM | [漏洞利用存在一定的访问条件] |
攻击向量: | NETWORK | [攻击者不需要获取内网访问权或本地访问权] |
身份认证: | NONE | [漏洞利用无需身份认证] |
–
CWE (弱点类目)
CWE-189 | [数值错误] |
–
CPE (受影响的平台与产品)
产品及版本信息(CPE)暂不可用 |
–
OVAL (用于检测的技术细节)
未找到相关OVAL定义 |
–
官方数据库链接
–
其它链接及资源
http://xforce.iss.net/xforce/xfdb/41107 (UNKNOWN) XF maxdb-vserver-code-execution(41107) |
http://www.vupen.com/english/advisories/2008/0844/references (UNKNOWN) VUPEN ADV-2008-0844 |
http://www.securitytracker.com/id?1019571 (UNKNOWN) SECTRACK 1019571 |
http://www.securityfocus.com/bid/28183 (UNKNOWN) BID 28183 |
http://secunia.com/advisories/29312 (VENDOR_ADVISORY) SECUNIA 29312 |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=669 (UNKNOWN) IDEFENSE 20080310 SAP MaxDB Signedness Error Heap Corruption Vulnerability |
–
漏洞信息
SAP MaxDB vserver组件远程堆溢出漏洞 | |
高危 | 数字错误 |
2008-03-11 00:00:00 | 2008-09-05 00:00:00 |
远程 | |
MaxDB是SAP应用中广泛使用的数据库管理系统。 MaxDB的vserver组件存在符号错误,远程攻击者可能利用此漏洞导致服务器不可用。 接受连接后,vserver进程会将从客户端读取的参数fork为各种结构,在这个过程中信任客户端所发送的值为有效。如果客户端发送了特制的请求的话,就可能触发堆溢出,导致内存破坏。 如果要利用这个漏洞,攻击者必须能在7210端口上与目标主机创建TCP会话,此外还需要知道服务器上活动数据库的名称。由于vserver服务在接受连接后使用fork()系统调用,因此攻击者可以反复利用这个漏洞,一些攻击尝试会导致数据库进程停止运行。 |
–
公告与补丁
目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接: http://www.sap.com/ |
–
漏洞信息 (F64480)
iDEFENSE Security Advisory 2008-03-10.1 (PacketStormID:F64480) |
2008-03-13 00:00:00 |
iDefense Labs idefense.com |
advisory,remote,arbitrary |
linux |
CVE-2008-0307 |
[点击下载] |
iDefense Security Advisory 03.10.08 – Remote exploitation of a signedness error in the “vserver” component of SAP AG's MaxDB could allow attackers to execute arbitrary code. After accepting a connection, the “vserver” process forks and reads parameters from the client into various structures. When doing so, it trusts values sent from the client to be valid. By sending a specially crafted request, an attacker can cause heap corruption. This leads to a potentially exploitable memory corruption condition. iDefense has confirmed the existence of this vulnerability in SAP AG's MaxDB version 7.6.0.37 on Linux. Other versions may also be affected. |
iDefense Security Advisory 03.10.08 http://labs.idefense.com/intelligence/vulnerabilities/ Mar 10, 2008 I. BACKGROUND SAP's MaxDB is a database software product. MaxDB was released as open source from version 7.5 up to version 7.6.00. Later versions are no longer open source but are available for download from the SAP SDN website (sdn.sap.com) as a community edition with free community support for public use beyond the scope of SAP applications. The "vserver" program is responsible for accepting and handling communication with remote database clients. For more information, visit the product's website at the following URL. https://www.sdn.sap.com/irj/sdn/maxdb II. DESCRIPTION Remote exploitation of a signedness error in the "vserver" component of SAP AG's MaxDB could allow attackers to execute arbitrary code. After accepting a connection, the "vserver" process forks and reads parameters from the client into various structures. When doing so, it trusts values sent from the client to be valid. By sending a specially crafted request, an attacker can cause heap corruption. This leads to a potentially exploitable memory corruption condition. III. ANALYSIS Exploitation allows an attacker to execute arbitrary code in the context of the running service. In order to exploit this vulnerability, an attacker must be able to establish a TCP session on port 7210 with the target host. Additionally, the attacker must know the name of an active database on the server. Since this service uses the fork() system call once a connection has been accepted, an attacker can repeatedly attempt to exploit this vulnerability. Some exploitation attempts may result in the database process ceasing to run, in which case further exploitation attempts will not be possible. IV. DETECTION iDefense has confirmed the existence of this vulnerability in SAP AG's MaxDB version 7.6.0.37 on Linux. Other versions may also be affected. V. WORKAROUND Employing firewalls to limit access to the affected service will mitigate exposure to this vulnerability. VI. VENDOR RESPONSE SAP AG has addressed this vulnerability by releasing a new version of MaxDB. For more information, consult SAP note 1140135. VII. CVE INFORMATION The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2008-0307 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org/), which standardizes names for security problems. VIII. DISCLOSURE TIMELINE 12/06/2007 Initial vendor notification 12/10/2007 Initial vendor response 03/10/2008 Coordinated public disclosure IX. CREDIT The discoverer of this vulnerability wishes to remain anonymous. Get paid for vulnerability research http://labs.idefense.com/methodology/vulnerability/vcp.php Free tools, research and upcoming events http://labs.idefense.com/ X. LEGAL NOTICES Copyright
–
漏洞信息
43084 |
|
SAP MaxDB vserver Unspecified Remote Memory Corruption | |
Remote / Network Access |
Input Manipulation |
Loss of Integrity | Upgrade |
Exploit Private | Vendor Verified, Coordinated Disclosure |
–
漏洞描述
–
时间线
2008-03-10 |
Unknow |
Unknow | 2008-03-10 |