Multiple vulnerabilities in SAP Web Application Server Technical details Application : SAP Web AS 6.40 < patch 136 and 7.00 < patch 66 Platform : All platforms (except the third vulnerability) Impacts : Remote file disclosure, remote DoS, local privilege escalation Release Date : 8 February 2007 Author : Nicob <nicob at nicob.net> Vulnerabilities technical details : =================================== 1) A remote file disclosure vulnerability allows reading any file to which the user that the SAP Web Application Server is running as had access. Under Windows, the service runs by default under the SAPServiceJ2E account. This account is member of the local administrator group. Exploit : use "r3-stealer-1.0.pl" (attached) Note : Absolute paths can be used, so "C:\boot.ini" and "\\10.11.12.13 \share\image.jpg" are both OK. 2) A remote denial of service allows crashing the enserver.exe process. Exploit : send "\x72\xfe" on port UDP/64999 3) A local privilege escalation vulnerability allows any local user to use the file disclosure vulnerability to access an user-controlled process via a named pipe and impersonate as user SAPServiceJ2E. The exploitation is possible only on Windows 2000 pre-SP4, Windows XP pre-SP2 and Windows NT. Exploit : use "r3-stealer-1.0.pl" (attached) and "tac0tac0.c" [1] Solutions : =========== Apply patch 136 or newer for version 6.40 Apply patch 66 or newer for version 7.00 Note : the mentioned patch level refers to the enqueue server More details can be found in SAP notes 948457 and 959877 [1] : http://security.nnov.ru/files/tac0tac0.c Nicob
Attachment:
r3-stealer-1.0.pl
Description: Perl program