SAP SAPCAR 721.510 has a Heap Based Buffer Overflow Vulnerability. It could be exploited with a crafted CAR archive file received from an untrusted remote source. The problem is that the length of data written is an arbitrary number found within the file. The vendor response is SAP Security Note 2441560.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
https://www.coresecurity.com/advisories/sap-sapcar-heap-based-buffer-overflow-vulnerability | third party advisory exploit |
https://www.exploit-db.com/exploits/41991/ | exploit |
http://www.securityfocus.com/bid/98350 | third party advisory vdb entry |