Check Point Reference: | CPAI-2008-396 |
Date Published: | 29 Oct 2009 |
Severity: | Critical |
Last Updated: | Thursday 29 October, 2009 |
Source: | |
Industry Reference: | CVE-2008-0244 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | SAP MaxDB is an open source relational database management system (RDBMS) developed and supported by SAP AG. MaxDB is targeted for large SAP environments such as mySAP Business Suite and other applications that require enterprise level database functionality. MaxDB is available for the most prominent operating system/hardware platforms: Microsoft Windows, Linux, and Unix. A shell command injection vulnerability exists in MaxDB database service. The vulnerability can be triggered when the service processes a specially crafted SAP command. An unauthenticated attacker can exploit this vulnerability by delivering a crafted request to the target host, resulting in command injection and execution with privileges of the affected MaxDB database service. A successful exploiting of the vulnerability allows an attacker to execute the shell commands with the privileges of the affected MaxDB service. The behaviour of the system depends on the nature of the injected shell commands. |
This protection will detect and block attempts to exploit this vulnerability
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Database Protection Violation.
Attack Information: SAP MaxDB remote arbitrary commands execution