PT-2011-46: Information disclosure in SAP Vulnerable softwareSAPApplication link: http://www.sap.com Severity levelSeverity level: Medium Impact: Information disclosure Access Vector: Network exploitable CVSS v2: Base Score: 5.0 Vector: (AV:N/AC:L/AU:N/C:P/I:N/A:N)CVE: not assignVulnerability descriptionThe specialists of the Positive Research center have detected "Information disclosure" vulnerability in SAP.An Information Leakage vulnerability exists in the way SAProuter works with dynamic memory. The cause of the leakage is that SAProuter does not clear the dynamically captured memory before reusing it. The vulnerability may (on certain conditions) allow attackers to obtain configuration files contents (including routing rules and access passwords).Moreover, the vulnerability potentially allows an attacker to obtain other users’ traffic that passes through SAProuter. Routing table can be obtained by attackers after administrator locally executes the saprouter –n command (which activates configuration file changes).How to fixUpdate your software up to the latest versionAdvisory status02.12.11 - Vendor is notified 02.12.11 - Vendor gets vulnerability details 03.08.12 - Vendor releases fixed version and details 23.08.12 - Public disclosureCreditsThe vulnerability was discovered by Ilya Smith, Maxim Tsoy, Kirill Mosolov, Evgeny Ryzhov , Positive Research Center (Positive Technologies Company)Referenceshttp://en.securitylab.ru/lab/PT-2011-46 https://service.sap.com/sap/support/notes/1663732 Reports on the vulnerabilities previously discovered by Positive Research:http://ptsecurity.com/research/advisory/ http://en.securitylab.ru/lab/