Vulnerabilities > CVE-2007-3614 - Buffer Overflow vulnerability in SAP DB Web Server WAHTTP.EXE
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Multiple stack-based buffer overflows in waHTTP.exe (aka the SAP DB Web Server) in SAP DB, possibly 7.3 through 7.5, allow remote attackers to execute arbitrary code via (1) a certain cookie value; (2) a certain additional parameter, related to sapdbwa_GetQueryString; and other unspecified vectors related to "numerous other fields."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 8 |
Exploit-Db
description SAP DB 7.4 WebTools Buffer Overflow. CVE-2007-3614. Remote exploit for windows platform id EDB-ID:16758 last seen 2016-02-02 modified 2010-07-16 published 2010-07-16 reporter metasploit source https://www.exploit-db.com/download/16758/ title SAP DB 7.4 WebTools Buffer Overflow description SAP DB 7.x Web Server WAHTTP.EXE Multiple Buffer Overflow Vulnerabilities. CVE-2007-3614. Remote exploit for windows platform id EDB-ID:30278 last seen 2016-02-03 modified 2007-07-05 published 2007-07-05 reporter Mark Litchfield source https://www.exploit-db.com/download/30278/ title SAP DB 7.x Web Server WAHTTP.EXE Multiple Buffer Overflow Vulnerabilities
Metasploit
description | This module exploits a stack buffer overflow in SAP DB 7.4 WebTools. By sending an overly long GET request, it may be possible for an attacker to execute arbitrary code. |
id | MSF:EXPLOIT/WINDOWS/HTTP/SAPDB_WEBTOOLS |
last seen | 2020-06-14 |
modified | 2017-07-24 |
published | 2007-07-11 |
references | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3614 |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/http/sapdb_webtools.rb |
title | SAP DB 7.4 WebTools Buffer Overflow |
Nessus
NASL family | CGI abuses |
NASL id | WEBDBM_DBM_INTERN_TEST_OVERFLOW.NASL |
description | The remote host is running SAP DB or MaxDB, a SAP-certified open- source database supporting OLTP and OLAP. According to its version, the Web DBM component of SAP DB or MaxDB on the remote host reportedly contains a stack-based buffer overflow triggered when displaying user-supplied arguments as part of the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 25681 |
published | 2007-07-10 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/25681 |
title | SAP DB / MaxDB Web Server DBM_INTERN_TEST Event Buffer Overflow |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/83057/sapdb_webtools.rb.txt |
id | PACKETSTORM:83057 |
last seen | 2016-12-05 |
published | 2009-11-26 |
reporter | MC |
source | https://packetstormsecurity.com/files/83057/SAP-DB-7.4-WebTools-Buffer-Overflow.html |
title | SAP DB 7.4 WebTools Buffer Overflow |
References
- http://osvdb.org/37838
- http://secunia.com/advisories/25954
- http://securityreason.com/securityalert/2867
- http://www.kb.cert.org/vuls/id/679041
- http://www.ngssoftware.com/advisories/critical-risk-vulnerability-in-sap-db-web-server-stack-overflow/
- http://www.securityfocus.com/archive/1/472891/100/0/threaded
- http://www.securityfocus.com/bid/24773
- http://www.securitytracker.com/id?1018341
- http://www.vupen.com/english/advisories/2007/2453
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35277