lserver in SAP DB 7.3 and earlier uses the current working directory to find and execute the lserversrv program, which allows local users to gain privileges with a malicious lserversrv that is called from a directory that has a symlink to the lserver program.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/10762 | vdb entry |
http://www.securityfocus.com/bid/6316 | patch vendor advisory vdb entry exploit |
http://www.sapdb.org/sap_db_alert.htm | patch |
http://marc.info/?l=bugtraq&m=103903565829796&w=2 | mailing list |