As a part of monthly updates Microsoft released security update MS15-034 which closes a vulnerability in driver HTTP.sys. This vulnerability enables an attacker to execute arbitrary code on OS remotely.
This update has a critical status as almost every modern version of Microsoft operating systems (Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, Windows 8.1, and Windows Server 2012 R2) is vulnerable.
We suppose it is necessary to report this kind of vulnerabilities due to the fact that a part of SAP products uses web server IIS for their work and, as a result, are also vulnerable to this issue.
At least the following components and SAP modules could be affected:
- SAP Afaria
- SAP TREX
- SAP Content Server
- SAP DB Web Tools.
To compromise a system an attacker just has to send a specially generated HTTP-request to a vulnerable server.
The vulnerability is an improper processing of HTTP header “Range” in function HTTP! UlpParseRange. It allows an attacker to use the vulnerability of an integer overflow to execute arbitrary code in the OS.
To secure your systems you should install Microsoft security update.
To check whether your systems are vulnerable, you can use the following script.
As our mission is to close the gap between technical and business security, we constantly monitor important news on the cybersecurity of business applications so that our customers are always warned about the latest facts in this area.