Vulnerability Description
The default installation of SAP R/3 46C/D allows remote attackers to bypass account locking by using the RFC API instead of the SAPGUI to conduct a brute force password guessing attack, which does not lock out the account like the SAPGUI does.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sap | Sap R 3 | All versions |
| Sap | Sapgui | 4.6c |
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004039.html
- http://www.securityfocus.com/archive/1/451378/100/0/threaded
- http://www.securityfocus.com/bid/7007Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/11487
- http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004039.html
- http://www.securityfocus.com/archive/1/451378/100/0/threaded
- http://www.securityfocus.com/bid/7007Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/11487
FAQ
What is CVE-2003-1035?
CVE-2003-1035 is a vulnerability with a CVSS score of 7.5 (HIGH). The default installation of SAP R/3 46C/D allows remote attackers to bypass account locking by using the RFC API instead of the SAPGUI to conduct a brute force password guessing attack, which does not...
How severe is CVE-2003-1035?
CVE-2003-1035 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2003-1035?
Check the references section above for vendor advisories and patch information. Affected products include: Sap Sap R 3, Sap Sapgui.