Vulnerability Description
Heap-based buffer overflow in the Message HTTP Server in SAP Message Server allows remote attackers to execute arbitrary code via a long string in the group parameter to /msgserver/html/group.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sap | Sap Message Server | All versions |
References
- http://marc.info/?l=bugtraq&m=118365794615827&w=2
- http://osvdb.org/38096
- http://secunia.com/advisories/25966PatchVendor Advisory
- http://securitytracker.com/id?1018340
- http://www.kb.cert.org/vuls/id/305657US Government Resource
- http://www.ngssoftware.com/advisories/critical-risk-vulnerability-in-sap-message
- http://www.securityfocus.com/bid/24765Exploit
- http://www.vupen.com/english/advisories/2007/2451
- https://exchange.xforce.ibmcloud.com/vulnerabilities/35279
- http://marc.info/?l=bugtraq&m=118365794615827&w=2
- http://osvdb.org/38096
- http://secunia.com/advisories/25966PatchVendor Advisory
- http://securitytracker.com/id?1018340
- http://www.kb.cert.org/vuls/id/305657US Government Resource
- http://www.ngssoftware.com/advisories/critical-risk-vulnerability-in-sap-message
FAQ
What is CVE-2007-3624?
CVE-2007-3624 is a vulnerability with a CVSS score of 10.0 (HIGH). Heap-based buffer overflow in the Message HTTP Server in SAP Message Server allows remote attackers to execute arbitrary code via a long string in the group parameter to /msgserver/html/group.
How severe is CVE-2007-3624?
CVE-2007-3624 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-3624?
Check the references section above for vendor advisories and patch information. Affected products include: Sap Sap Message Server.