Close

HAVE QUESTIONS?

A partner account manager can help. Contact us today.

[ERPSCAN-14-024] SAP Kernel – RCE and DoS vulnerability

Application: SAP NetWeaver Dispatcher
Versions Affected: SAP Kernel 7.00 32BIT, 7.40 64BIT
Vendor URL: http://www.sap.com
Vulnerability: Buffer Overflow - RCE, Denial of Service
Exploits: YES
Reported: 25.08.2014
Vendor response: 25.08.2014
Date of Public Advisory: 15.12.2014
Reference: SAP Security Note 2061271
Author: George Nosenko (ERPScan)

VULNERABILITY INFORMATION
Class: Buffer overflow [CWE-119], [CWE-20]
Impact: Allows an unauthorized attacker to execute remote code
Remotely Exploitable: Yes
Locally Exploitable: No
CVE Name: CVE-2014-9595

Business Risk
An attacker can use a denial of service vulnerability for terminating the process of the vulnerable component. As a result, nobody can use this service, which has a negative influence on business processes. System downtime also harms business reputation.

Description
The vulnerability has been found in SAP Kernel (NetWeaver Dispatcher) and can allow an authenticated remote attacker to execute arbitrary code or lead to denial of service conditions.

VULNERABLE PACKAGES

  • SAP KERNEL 7.00 32BIT, disp+work.exe (7000.52.12.34966)
  • SAP KERNEL 7.40 64BIT, disp+work.exe (7400.12.21.30308)

Other versions are probably affected too, but they were not checked.

SOLUTIONS AND WORKAROUNDS
To correct this vulnerability, install SAP Security Note 2061271.

TECHNICAL DESCRIPTION
The vulnerability in SAP NetWeaver Dispatcher can allow an authenticated remote attacker to execute arbitrary code. It can also lead to denial of service.

Defense

To prevent this issue as well as a plethora of other vulnerabilities that may affect your systems, ERPScan provides the following services: