eo420_GetStringFromVarPart in veo420.c for SAP database server (SAP DB) 7.4.03.27 and earlier may allow remote attackers to execute arbitrary code via a connect packet with a 256 byte segment to the niserver (aka serv.exe) process on TCP port 7269, which prevents the server from NULL terminating the string and leads to a buffer overflow.
Link | Tags |
---|---|
http://www.atstake.com/research/advisories/2003/a111703-1.txt | exploit patch vendor advisory |
http://www.sapdb.org/7.4/new_relinfo.txt |