CVE-2014-0995

The Standalone Enqueue Server in SAP Netweaver 7.20, 7.01, and earlier allows remote attackers to cause a denial of service (uncontrolled recursion and crash) via a trace level with a wildcard in the Trace Pattern.
References
Link Resource
http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/ Third Party Advisory
http://packetstormsecurity.com/files/128726/SAP-Netweaver-Enqueue-Server-Trace-Pattern-Denial-Of-Service.html Exploit Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2014/Oct/76 Exploit Mailing List Third Party Advisory
http://secunia.com/advisories/60950 Third Party Advisory
http://www.coresecurity.com/advisories/sap-netweaver-enqueue-server-trace-pattern-denial-service-vulnerability Exploit Third Party Advisory
http://www.securityfocus.com/archive/1/533719/100/0/threaded Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/97610 Third Party Advisory VDB Entry
https://twitter.com/SAP_Gsupport/status/522750365780160513 Broken Link
http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/ Third Party Advisory
http://packetstormsecurity.com/files/128726/SAP-Netweaver-Enqueue-Server-Trace-Pattern-Denial-Of-Service.html Exploit Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2014/Oct/76 Exploit Mailing List Third Party Advisory
http://secunia.com/advisories/60950 Third Party Advisory
http://www.coresecurity.com/advisories/sap-netweaver-enqueue-server-trace-pattern-denial-service-vulnerability Exploit Third Party Advisory
http://www.securityfocus.com/archive/1/533719/100/0/threaded Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/97610 Third Party Advisory VDB Entry
https://twitter.com/SAP_Gsupport/status/522750365780160513 Broken Link
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sap:netweaver:*:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver:7.20:*:*:*:*:*:*:*

History

21 Nov 2024, 02:03

Type Values Removed Values Added
References () http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/ - Third Party Advisory () http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/ - Third Party Advisory
References () http://packetstormsecurity.com/files/128726/SAP-Netweaver-Enqueue-Server-Trace-Pattern-Denial-Of-Service.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/128726/SAP-Netweaver-Enqueue-Server-Trace-Pattern-Denial-Of-Service.html - Exploit, Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2014/Oct/76 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2014/Oct/76 - Exploit, Mailing List, Third Party Advisory
References () http://secunia.com/advisories/60950 - Third Party Advisory () http://secunia.com/advisories/60950 - Third Party Advisory
References () http://www.coresecurity.com/advisories/sap-netweaver-enqueue-server-trace-pattern-denial-service-vulnerability - Exploit, Third Party Advisory () http://www.coresecurity.com/advisories/sap-netweaver-enqueue-server-trace-pattern-denial-service-vulnerability - Exploit, Third Party Advisory
References () http://www.securityfocus.com/archive/1/533719/100/0/threaded - Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/533719/100/0/threaded - Third Party Advisory, VDB Entry
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/97610 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/97610 - Third Party Advisory, VDB Entry
References () https://twitter.com/SAP_Gsupport/status/522750365780160513 - Broken Link () https://twitter.com/SAP_Gsupport/status/522750365780160513 - Broken Link

Information

Published : 2014-11-06 15:55

Updated : 2024-11-21 02:03


NVD link : CVE-2014-0995

Mitre link : CVE-2014-0995

CVE.ORG link : CVE-2014-0995


JSON object : View

Products Affected

sap

  • netweaver
CWE
CWE-20

Improper Input Validation