Check Point Advisories

Update Protection against SAP GUI TabOne ActiveX Control Caption List Buffer Overflow

Check Point Reference: CPAI-2009-019
Date Published: 9 Jan 2009
Severity: High
Last Updated: Thursday 01 January, 2009
Source: Secunia Advisory: SA32672
Industry Reference:CVE-2008-4827
Protection Provided by:
Who is Vulnerable? SAP GUI 6.40 Patch 29
SAP GUI 7.10
Vulnerability Description The SAP GUI is the GUI client in SAP's 3-tier architecture of database, application server and client. The SAP GUI family is available for Windows, Java, and HTML/Internet Transaction Server (ITS) environment. A buffer overflow vulnerability was reported in the SAP GUI. Remote attackers can exploit this vulnerability by persuading a target user to visit a specially crafted web page. Successful exploitation may result in execution of arbitrary code.
Vulnerability DetailsSAP GUI for Windows environment is shipped with a library SIZERONE. This library registers an ActiveX control, TabOne. The ActiveX control TabOne has a method named AddTab. The vulnerability is caused due to a boundary error in the included TabOne ActiveX control when copying tab captions. This can be exploited to cause a heap-based buffer overflow that may result in execution of arbitrary code.  

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK