CERTA-2007-AVI-288
Vulnerability from certfr_avis - Published: - Updated:None
Description
De nombreuses vulnérabilités découvertes dans les produits SAP permettent à un utilisateur distant malintentionné de réaliser un déni de service, de porter atteinte à la confidentialité des données ou d'exécuter du code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SAP | N/A | SAP Web Application Server 6.x ; | ||
| SAP | N/A | SAP NetWeaver 4.x ; | ||
| SAP | N/A | SAP RFC Library 7.x. | ||
| SAP | N/A | SAP RFC Library 6.x ; | ||
| SAP | N/A | SAP Internet Graphics Service (IGS) 7.x ; | ||
| SAP | N/A | SAP Internet Communication Framework ; | ||
| SAP | N/A | SAP Web Application Server 7.x ; | ||
| SAP | N/A | SAP Message Server ; | ||
| SAP | N/A | SAP Internet Graphics Service (IGS) 6.x ; | ||
| SAP | N/A | SAP R/3 ; | ||
| SAP | N/A | SAP DB 7.x ; |
References
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SAP Web Application Server 6.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "SAP NetWeaver 4.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "SAP RFC Library 7.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "SAP RFC Library 6.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "SAP Internet Graphics Service (IGS) 7.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "SAP Internet Communication Framework ;",
"product": {
"name": "N/A",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "SAP Web Application Server 7.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "SAP Message Server ;",
"product": {
"name": "N/A",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "SAP Internet Graphics Service (IGS) 6.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "SAP R/3 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "SAP DB 7.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "SAP",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe nombreuses vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans les produits SAP\npermettent \u00e0 un utilisateur distant malintentionn\u00e9 de r\u00e9aliser un d\u00e9ni\nde service, de porter atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es ou\nd\u0027ex\u00e9cuter du code arbitraire.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-1915",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1915"
},
{
"name": "CVE-2007-3496",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3496"
},
{
"name": "CVE-2007-3495",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3495"
},
{
"name": "CVE-2007-1917",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1917"
},
{
"name": "CVE-2007-1914",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1914"
},
{
"name": "CVE-2007-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1916"
},
{
"name": "CVE-2007-1918",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1918"
}
],
"links": [
{
"title": "Bulletins de s\u00e9curit\u00e9 NGS Software du 05 juillet 2007 : \n \n /",
"url": "http://www.ngssoftware.com/advisories/medium-risk-vulnerability-in-sap-internet-graphics-server/"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 CNSC du 17 juin 2007 :",
"url": "http://www.csnc.ch/advisory/sap01.html?__cookie_try=1"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 CYBSEC du 03 avril 2007 :",
"url": "http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_SAP_TRUSTED_SYSTEM_SECURITY_RFC_Function_Information_Disclosure.pdf"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 NGS Software du 05 juillet 2007 : \n \n /",
"url": "http://www.ngssoftware.com/advisories/critical-risk-vulnerability-in-sap-message-server-heap-overflow/"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 NGS Software du 05 juillet 2007 : \n \n /",
"url": "http://www.ngssoftware.com/advisories/critical-risk-vulnerability-in-sap-db-web-server-stack-overflow/"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 CNSC du 17 juin 2007 :",
"url": "http://www.csnc.ch/advisory/sap02.html?__cookie_try=1"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 CYBSEC du 03 avril 2007 :",
"url": "http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_SAP_SYSTEM_CREATE_INSTANCE_RFC_Function_Buffer_Overflow.pdf"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 CYBSEC du 03 avril 2007 :",
"url": "http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_SAP_RFC_START_GUI_RFC_Function_Buffer_Overflow.pdf"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 NGS Software du 05 juillet 2007 : \n \n /",
"url": "http://www.ngssoftware.com/advisories/high-risk-vulnerability-in-sap-internet-communication-manager-dos"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 CYBSEC du 03 avril 2007 :",
"url": "http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_SAP_RFC_START_PROGRAM_RFC_Function_Multiple_Vulnerabilities.pdf"
},
{
"title": "Bulletins de s\u00e9curit\u00e9 CYBSEC du 03 avril 2007 :",
"url": "http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_SAP_RFC_SET_REG_SERVER_PROPERTIE_RFC_Function_Denial_of_Service.pdf"
}
],
"reference": "CERTA-2007-AVI-288",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-07-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": null,
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits SAP",
"vendor_advisories": []
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…