8 results (0.005 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

SAP SQL Anywhere - version 17.0, allows an attacker to prevent legitimate users from accessing the service by crashing the service. An attacker with low privileged account and access to the local system can write into the shared memory objects. This can be leveraged by an attacker to perform a Denial of Service. Further, an attacker might be able to modify sensitive data in shared memory objects.This issue only affects SAP SQL Anywhere on Windows. Other platforms are not impacted. • https://me.sap.com/notes/3331029 https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html • CWE-277: Insecure Inherited Permissions CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

SAP SQL Anywhere - version 17.0, allows an authenticated attacker to prevent legitimate users from accessing a SQL Anywhere database server by crashing the server with some queries that use an ARRAY constructor. SAP SQL Anywhere versión 17.0, permite a un atacante autenticado evitar que usuarios legítimos accedan a un servidor de base de datos SQL Anywhere bloqueando el servidor con algunas consultas que utilizan un constructor ARRAY. • https://launchpad.support.sap.com/#/notes/3229987 https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

SAP SQL Anywhere - version 17.0, and SAP IQ - version 16.1, allows an attacker to leverage logical errors in memory management to cause a memory corruption, such as Stack-based buffer overflow. SAP SQL Anywhere - versión 17.0, y SAP IQ - versión 16.1, permite a un atacante aprovechar errores lógicos en la administración de la memoria para causar una corrupción de memoria, como un desbordamiento de búfer en la región Stack de la memoria This vulnerability allows remote attackers to execute arbitrary code on affected installations of SAP SQL Anywhere. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Database Server, which listens on TCP and UDP ports 2638 by default. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the root. • https://launchpad.support.sap.com/#/notes/3232021 https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html • CWE-121: Stack-based Buffer Overflow •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

SAP SQL Anywhere - version 17.0, allows an authenticated attacker to prevent legitimate users from accessing a SQL Anywhere database server by crashing the server with some queries that use indirect identifiers. SAP SQL Anywhere - versión 17.0, permite que un atacante autenticado impida que los usuarios legítimos accedan a un servidor de base de datos SQL Anywhere al bloquear el servidor con algunas consultas que usan identificadores indirectos • https://launchpad.support.sap.com/#/notes/3148094 https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html • CWE-99: Improper Control of Resource Identifiers ('Resource Injection') •

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0

A binary planting in SAP SQL Anywhere, before version 17.0, SAP IQ, before version 16.1, and SAP Dynamic Tier, before versions 1.0 and 2.0, can result in the inadvertent access of files located in directories outside of the paths specified by the user. Una plantación binaria en SAP SQL Anywhere, versión anterior a 17.0, SAP IQ, versión anterior a 16.1, y SAP Dynamic Tier, versiones anteriores a 1.0 y 2.0, puede resultar en el acceso inadvertido de archivos localizados en directorios fuera de las rutas especificadas por el usuario. • https://launchpad.support.sap.com/#/notes/2792430 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528123050 • CWE-552: Files or Directories Accessible to External Parties •