PT-2011-46: Information disclosure in SAP
Severity level: Medium
Impact: Information disclosure
Access Vector: Network exploitable
Base Score: 5.0
CVE: not assign
The specialists of the Positive Research center have detected "Information disclosure" vulnerability in SAP.
An Information Leakage vulnerability exists in the way SAProuter works with dynamic memory.
The cause of the leakage is that SAProuter does not clear the dynamically captured memory before reusing it.
The vulnerability may (on certain conditions) allow attackers to obtain configuration files contents (including routing rules and access passwords).
Moreover, the vulnerability potentially allows an attacker to obtain other users’ traffic that passes through SAProuter.
Routing table can be obtained by attackers after administrator locally executes the saprouter –n command (which activates configuration file changes).
How to fix
Update your software up to the latest version
02.12.11 - Vendor is notified
02.12.11 - Vendor gets vulnerability details
03.08.12 - Vendor releases fixed version and details
23.08.12 - Public disclosure
The vulnerability was discovered by Ilya Smith, Maxim Tsoy, Kirill Mosolov, Evgeny Ryzhov , Positive Research Center (Positive Technologies Company)
Reports on the vulnerabilities previously discovered by Positive Research: