exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

CYBSEC-SAPlocal.txt

CYBSEC-SAPlocal.txt
Posted May 22, 2006
Authored by Leandro Meiners | Site cybsec.com

CYBSEC Security Advisory - The SAP sapdba command for Informix versions prior to 700 and version 700 up to patch number 100 is susceptible to a local privilege escalation flaw.

tags | advisory, local
SHA-256 | d0bb0296b74b8630d49c49d2a5a2b787bb7acd1aa5e70e8c1d5bfd9da9d8fd23

CYBSEC-SAPlocal.txt

Change Mirror Download

--=-Yj01e//KXx70uI5s6JtB
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable

(The following advisory is also available in PDF format for download at:
http://www.cybsec.com/vuln/CYBSEC_Security_Pre-Advisory_Local_Privilege_Esc=
alation_in_SAP_sapdba_Command.pdf )

CYBSEC S.A.
www.cybsec.com

Pre-Advisory Name: Local Privilege Escalation in SAP sapdba Command

Vulnerability Class: Insecure Environment Variable Handling

Release Date: 05/18/2006

Affected Applications: =20
* sapdba command for Informix version prior to 700
* sapdba command for Informix version 700 up to patch number 100

Unaffected Applications:=20
* sapdba command for Oracle Databases

Affected Platforms:=20
* SAP with Informix on HP-UX, Solaris, AIX, TRUE64 or Linux

Local / Remote: Local

Severity: Medium

Author: Leandro Meiners.

Vendor Status: =20
* Confirmed, patch released

Reference to Vulnerability Disclosure Policy:=20
http://www.cybsec.com/vulnerability_policy.pdf

Product Overview:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

The sapdba command is a utility provided by SAP for database
administration. Two different versions are available, one for Informix
and another for Oracle databases.

Vulnerability Description:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D

The sapdba command for Informix Databases was found to allow any UNIX
user to run arbitrary commands with informix rights at the shell level,
due to improper handling of environment variables.

Technical Details:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

Technical details will be released three months after publication of
this pre-advisory. This was agreed upon with SAP to allow their clients
to upgrade affected software prior to the technical knowledge been
publicly available.=20

Impact:
=3D=3D=3D=3D=3D=3D=3D

Any user with login access to the SAP database server having a
vulnerable version of the sapdba command can escalate privileges to
execute arbitrary commands with the rights of the informix user. =20

Solutions:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

SAP released a patch regarding this issue. Details can be found in SAP
note 944585.

Vendor Response:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
* 04/20/2006: Initial Vendor Contact and technical details for the
vulnerabilities sent to vendor.
* 04/26/2006: Solution provided by vendor.
* 05/18/2006: Coordinate release of pre-advisory without technical
details.
* 08/18/2006: Coordinate release of advisory with technical details.

Contact Information:
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

For more information regarding the vulnerability feel free to contact
the author at lmeiners<at>cybsec.com. Please bear in mind that technical
details will be disclosed three months after the release of this
pre-advisory, so such questions won't be answered until then.=20

For more information regarding CYBSEC: www.cybsec.com

----------------------------
Leandro Meiners
CYBSEC S.A. Security Systems
E-mail: lmeiners@cybsec.com
Tel/Fax: [54-11] 4382-1600
Web: http://www.cybsec.com
PGP-Key: http://pgp.mit.edu:11371/pks/lookup?search=3Dlmeiners&op=3Dindex

--=-Yj01e//KXx70uI5s6JtB
Content-Type: application/pgp-signature; name=signature.asc
Content-Description: This is a digitally signed message part

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD4DBQBEbILQxuYFUE35cXMRAg/fAJicfGUCsuKOfE+dfmTQqJ5bo8GrAKDAsLwj
fpthGOmaV4ArZcsoJB3rZg==
=bz/i
-----END PGP SIGNATURE-----

--=-Yj01e//KXx70uI5s6JtB--

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close