Vulnerabilities > CVE-2014-8592 - Unspecified vulnerability in SAP Netweaver 7.02/7.30
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Unspecified vulnerability in SAP Host Agent, as used in SAP NetWeaver 7.02 and 7.3, allows remote attackers to cause a denial of service (process termination) via a crafted request.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
References
- http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/
- http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/
- https://erpscan.io/advisories/erpscan-14-017-sap-netweaver-http-partial-http-post-requests-dos/
- https://erpscan.io/advisories/erpscan-14-017-sap-netweaver-http-partial-http-post-requests-dos/
- https://erpscan.io/advisories/erpscan-14-018-sap-netweaver-j2ee-engine-partial-http-post-requests-dos/
- https://erpscan.io/advisories/erpscan-14-018-sap-netweaver-j2ee-engine-partial-http-post-requests-dos/
- https://erpscan.io/advisories/erpscan-14-019-sap-netweaver-j2ee-engine-partial-http-post-requests-dos/
- https://erpscan.io/advisories/erpscan-14-019-sap-netweaver-j2ee-engine-partial-http-post-requests-dos/
- https://erpscan.io/advisories/erpscan-14-020-sap-netweaver-management-console-gsaop-partial-http-requests-dos/
- https://erpscan.io/advisories/erpscan-14-020-sap-netweaver-management-console-gsaop-partial-http-requests-dos/
- https://erpscan.io/advisories/erpscan-14-021-sap-netweaver-management-console-gsaop-partial-http-post-requests-dos/
- https://erpscan.io/advisories/erpscan-14-021-sap-netweaver-management-console-gsaop-partial-http-post-requests-dos/
- https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/
- https://erpscan.io/press-center/blog/sap-critical-patch-update-october-2014/
- https://service.sap.com/sap/support/notes/1986725
- https://service.sap.com/sap/support/notes/1986725
- https://twitter.com/SAP_Gsupport/status/523111735637864448
- https://twitter.com/SAP_Gsupport/status/523111735637864448