|Main Archive Page > Month Archives > full-disclosure-uk archives|
Rating: Highly critical
Impact: System compromise
"SAP GUI is SAP's universal client for accessing SAP functionality in SAP applications such as - SAP ERP, SAP Business Suite (SAP CRM, SAP SCM and SAP PLM), SAP Business Intelligence and so on. SAP GUI functions like a browser. It gets information from the SAP server like what, where, when and how, to display contents in its window.".
Secunia Research has discovered a vulnerability in SAP GUI, which can be exploited by malicious people to potentially compromise a user's system.
The vulnerability is caused due to a boundary error in the included TabOne ActiveX control (sizerone.ocx) when copying tab captions. This can be exploited to cause a heap-based buffer overflow by e.g. adding multiple tabs via the "AddTab()" method.
Successful exploitation may allow execution of arbitrary code.
Update to the latest 7.10 PL, which sets the kill-bit for the ActiveX control.
Users can also set the kill-bit manually by following the procedure explained in SAP note 1092631.
Discovered by Carsten Eiram, Secunia Research.
The Common Vulnerabilities and Exposures (CVE) project has assigned CVE-2008-4827 for the vulnerability.
Secunia offers vulnerability management solutions to corporate customers with verified and reliable vulnerability intelligence relevant to their specific system configuration:
Secunia also provides a publicly accessible and comprehensive advisory database as a service to the security community and private individuals, who are interested in or concerned about IT-security.
Secunia believes that it is important to support the community and to do active vulnerability research in order to aid improving the security and reliability of software in general:
Secunia regularly hires new skilled team members. Check the URL below to see currently vacant positions:
Secunia offers a FREE mailing list called Secunia Security Advisories:
Please verify this advisory by visiting the Secunia website: http://secunia.com/secunia_research/2008-53/
Complete list of vulnerability reports published by Secunia Research: http://secunia.com/secunia_research/