Korean
<< Back
VID 210005
Severity 40
Port 9999, ...
Protocol TCP
Class CGI
Detailed Description The MaxDB web server, according to its version number, has a buffer overflow flaw in the Web DBM component. MaxDB is a SAP-certified open-source database supporting OLTP and OLAP. SAP DB and MaxDB versions prior to 7.6.00.30 could allow a remote attacker to execute arbitrary code, caused by a buffer overflow vulnerability in the Web DBM component. By sending a specially-crafted HTTP request from a WebDBM client to the DBM server, a remote attacker could execute arbitrary code on the system with privileges of the 'wahttp' process.

* Note: This check solely relied on the version number of the Web DBM component installed on the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://www.symantec.com/enterprise/research/SYMSA-2006-009.txt
http://www.securityfocus.com/archive/1/444601/30/0/threaded

* Platforms Affected:
MySQL, MaxDB versions to 7.6.00.30
SAP AG, SAP DB Any version
Any operating system Any version
Recommendation For MaxDB:
Upgrade to the latest version of Web DBM (7.6.00.31 or later), available from the MySQL Web site at http://dev.mysql.com/downloads/maxdb/7.6.00.html

For SAP-DB:
Contact your vendor for patch or upgrade information:
https://websmp106.sap-ag.de/~SAPIDP/002006825000000234912001E

For Debian GNU/Linux:
Upgrade to the fixed version of maxdb, as listed in Debian Security Advisory DSA-1190-1 at http://www.debian.org/security/2006/dsa-1190
Related URL CVE-2006-4305 (CVE)
Related URL 19660 (SecurityFocus)
Related URL 28636 (ISS)