SAP RFC_START_GUI RFC函数缓冲区溢出漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1191049 漏洞类型 缓冲区溢出
发布时间 2007-04-10 更新时间 2007-04-11
CVE编号 CVE-2007-1916 CNNVD-ID CNNVD-200704-168
漏洞平台 N/A CVSS评分 10.0
|漏洞来源
https://cxsecurity.com/issue/WLB-2007040045
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200704-168
|漏洞详情
SAP的RFC库是SAP软件中所广泛使用的组件,允许用户从外部应用程序调用SAP系统中的任意RFC函数。SAP的RFC库默认所安装的RFC_START_GUIRFC函数中存在缓冲区溢出,允许攻击者通过外部RFC服务器远程执行任意指令。
|漏洞EXP
(The following pre-advisory is also available in PDF format for download at:
http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_SAP_RFC_START_GUI_RF
C_Function_Buffer_Overflow.pdf )

CYBSEC S.A.
www.cybsec.com

Pre-Advisory Name: SAP RFC_START_GUI RFC Function Buffer Overflow
==================

Vulnerability Class: Buffer Overflow
====================

Release Date: 2007-04-03
=============

Affected Applications:
======================
. SAP RFC Library 6.40
. SAP RFC Library 7.00

Affected Platforms:
===================

. AIX 32bit
. AIX 64bit
. HP-UX on IA64 64bit
. HP-UX on PA-RISC 64bit
. Linux on IA32 32bit
. Linux on IA64 64bit
. Linux on Power 64bit
. Linux on x86_64 64bit
. Linux on zSeries 64bit
. Mac OS
. OS/400
. OS/400 V5R2M0
. Reliant 32bit
. Solaris on SPARC 32bit
. Solaris on SPARC 64bit
. Solaris on x64_64 64bit
. TRU64 64bit
. Windows Server on IA32 32bit
. Windows Server on IA64 64bit
. Windows Server on x64 64bit
. z/OS 32bit

Local / Remote: Remote
===============

Severity: High
=========

Author: Mariano Nuez Di Croce
=======

Vendor Status: Confirmed. Updates Released.
==============

Reference to Vulnerability Disclosure Policy: http://www.cybsec.com/vulnerability_policy.pdf
=============================================

Product Overview:
=================

"The RFC Library offers an interface to a SAP System. The RFC Library is the most commonly used and installed component of existing SAP Software. This
interface provides the opportunity to call any RFC Function in a SAP System from an external application. Moreover, the RFC Library offers the
possibility to write a RFC Server Program, which is accessible from any SAP System or external application. Most SAP Connectors use the RFC Library as
communication platform to SAP Systems."

RFC_START_GUI RFC Function is used to start SAPGUI on front-end systems. This function is installed by default in every external RFC server.

Vulnerability Description:
==========================

A remote buffer overflow vulnerability has been detected in the RFC_START_GUI RFC Function.

Technical Details:
==================

Technical details will be released three months after publication of this pre-advisory. This was agreed upon with SAP to allow their customers to
upgrade affected software prior to technical knowledge been publicly available.

Impact:
=======

This vulnerability may allow an attacker to remotely execute arbitrary commands over external RFC servers.

Solutions:
==========

SAP has released patches to address this vulnerability. Affected customers should apply the patches immediately.
More information can be found on SAP Note 1003908.

Vendor Response:
================

. 2006-11-21: Initial Vendor Contact.
. 2006-12-01: Vendor Confirmed Vulnerability.
. 2006-12-11: Vendor Releases Update for version 6.40.
. 2006-12-11: Vendor Releases Update for version 7.00.
. 2007-04-03: Pre-Advisory Public Disclosure.

Special Thanks:
===============

Thanks goes to Victor Montero and Gustavo Kunst.

Contact Information:
====================
For more information regarding the vulnerability feel free to contact the author at mnunez <at> cybsec <dot> com.

About  CYBSEC S.A. Security Systems
-----------------------------------

Since 1996 CYBSEC S.A. is devoted exclusively to provide professional services specialized in Computer Security. More than 150 clients around the
globe validate our quality and professionalism.
To keep objectivity, CYBSEC S.A. does not represent, neither sell, nor is associated with other software and/or hardware provider companies.
Our services are strictly focused on Information Security, protecting our clients from emerging security threats, mantaining their IT deployments
available, safe, and reliable.
Beyond professional services, CYBSEC is continuosly researching new defense and attack techiniques and contributing with the security community with
high quality information exchange.
	
For more information, please visit www.cybsec.com

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGE54RvWPewvmdrSgRAh8iAJ99gpY7Wv3LfK4X/goRltmCkEZEQACeJAxM
kQqbJmLndlgDSp0GgyneUp8=
=lv9k
-----END PGP SIGNATURE-----

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFGE552vWPewvmdrSgRAoRpAKCVQ17bv2WPKFQp0sEbdx6J0sGqjwCbBcA4
nbHdV3monj6CqlHKfrdL60k=
=Gu/Q
-----END PGP SIGNATURE-----
|参考资料

来源:XF
名称:sap-rfc-startgui-bo(33420)
链接:http://xforce.iss.net/xforce/xfdb/33420
来源:BID
名称:23304
链接:http://www.securityfocus.com/bid/23304
来源:BUGTRAQ
名称:20070404CYBSECSecurityPre-Advisory:SAPRFC_START_GUIRFCFunctionBufferOverflow
链接:http://www.securityfocus.com/archive/1/archive/1/464680/100/0/threaded
来源:VUPEN
名称:ADV-2007-1270
链接:http://www.frsirt.com/english/advisories/2007/1270
来源:MISC
链接:http://www.cybsec.com/vuln/CYBSEC-Security_Advisory_SAP_RFC_START_GUI_RFC_Function_Buffer_Overflow.pdf
来源:SECUNIA
名称:24722
链接:http://secunia.com/advisories/24722
来源:SREASON
名称:2537
链接:http://securityreason.com/securityalert/2537