eo420_GetStringFromVarPart in veo420.c for SAP database server (SAP DB) 7.4.03.27 and earlier may allow remote attackers to execute arbitrary code via a connect packet with a 256 byte segment to the niserver (aka serv.exe) process on TCP port 7269, which prevents the server from NULL terminating the string and leads to a buffer overflow.
References
Link | Resource |
---|---|
http://www.atstake.com/research/advisories/2003/a111703-1.txt | Exploit Patch Vendor Advisory |
http://www.sapdb.org/7.4/new_relinfo.txt | |
http://www.atstake.com/research/advisories/2003/a111703-1.txt | Exploit Patch Vendor Advisory |
http://www.sapdb.org/7.4/new_relinfo.txt |
Configurations
History
20 Nov 2024, 23:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.atstake.com/research/advisories/2003/a111703-1.txt - Exploit, Patch, Vendor Advisory | |
References | () http://www.sapdb.org/7.4/new_relinfo.txt - |
Information
Published : 2003-12-15 05:00
Updated : 2024-11-20 23:45
NVD link : CVE-2003-0939
Mitre link : CVE-2003-0939
CVE.ORG link : CVE-2003-0939
JSON object : View
Products Affected
sap
- sap_db
CWE