PT-2011-46: Information disclosure in SAP
Vulnerable software
SAP
Application link:
http://www.sap.com
Severity level
Severity level: Medium
Impact: Information disclosure
Access Vector: Network exploitable
CVSS v2:
Base Score: 5.0
Vector: (AV:N/AC:L/AU:N/C:P/I:N/A:N)
CVE: not assign
Vulnerability description
The specialists of the Positive Research center have detected "Information disclosure" vulnerability in SAP.
An Information Leakage vulnerability exists in the way SAProuter works with dynamic memory.
The cause of the leakage is that SAProuter does not clear the dynamically captured memory before reusing it.
The vulnerability may (on certain conditions) allow attackers to obtain configuration files contents (including routing rules and access passwords).
Moreover, the vulnerability potentially allows an attacker to obtain other users’ traffic that passes through SAProuter.
Routing table can be obtained by attackers after administrator locally executes the saprouter –n command (which activates configuration file changes).
How to fix
Update your software up to the latest version
Advisory status
02.12.11 - Vendor is notified
02.12.11 - Vendor gets vulnerability details
03.08.12 - Vendor releases fixed version and details
23.08.12 - Public disclosure
Credits
The vulnerability was discovered by Ilya Smith, Maxim Tsoy, Kirill Mosolov, Evgeny Ryzhov , Positive Research Center (Positive Technologies Company)
References
http://en.securitylab.ru/lab/PT-2011-46
https://service.sap.com/sap/support/notes/1663732
Reports on the vulnerabilities previously discovered by Positive Research:
http://ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/