Check Point Reference: | CPAI-2009-019 |
Date Published: | 9 Jan 2009 |
Severity: | High |
Last Updated: | Thursday 01 January, 2009 |
Source: | Secunia Advisory: SA32672 |
Industry Reference: | CVE-2008-4827 |
Protection Provided by: | |
Who is Vulnerable? | SAP GUI 6.40 Patch 29 SAP GUI 7.10 |
Vulnerability Description | The SAP GUI is the GUI client in SAP's 3-tier architecture of database, application server and client. The SAP GUI family is available for Windows, Java, and HTML/Internet Transaction Server (ITS) environment. A buffer overflow vulnerability was reported in the SAP GUI. Remote attackers can exploit this vulnerability by persuading a target user to visit a specially crafted web page. Successful exploitation may result in execution of arbitrary code. |
Vulnerability Details | SAP GUI for Windows environment is shipped with a library SIZERONE. This library registers an ActiveX control, TabOne. The ActiveX control TabOne has a method named AddTab. The vulnerability is caused due to a boundary error in the included TabOne ActiveX control when copying tab captions. This can be exploited to cause a heap-based buffer overflow that may result in execution of arbitrary code. |