Under certain conditions SAP HANA, 1.00, 2.00, allows an unauthenticated attacker to access information which would otherwise be restricted. An attacker can misuse the authentication function of the SAP HANA server on its SQL interface and disclose 8 bytes of the server process memory. The attacker cannot influence or predict the location of the leaked memory.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/102997 | Third Party Advisory VDB Entry |
https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ | Vendor Advisory |
https://launchpad.support.sap.com/#/notes/2572940 | Permissions Required |
http://www.securityfocus.com/bid/102997 | Third Party Advisory VDB Entry |
https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ | Vendor Advisory |
https://launchpad.support.sap.com/#/notes/2572940 | Permissions Required |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:03
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/102997 - Third Party Advisory, VDB Entry | |
References | () https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ - Vendor Advisory | |
References | () https://launchpad.support.sap.com/#/notes/2572940 - Permissions Required |
Information
Published : 2018-02-14 12:29
Updated : 2024-11-21 04:03
NVD link : CVE-2018-2369
Mitre link : CVE-2018-2369
CVE.ORG link : CVE-2018-2369
JSON object : View
Products Affected
sap
- hana
CWE