Page 2 of 10 results (0.007 seconds)

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 0

Under certain conditions SAP HANA, 1.00, 2.00, allows an unauthenticated attacker to access information which would otherwise be restricted. An attacker can misuse the authentication function of the SAP HANA server on its SQL interface and disclose 8 bytes of the server process memory. The attacker cannot influence or predict the location of the leaked memory. Bajo ciertas condiciones, SAP HANA 1.00 y 2.00 permite que un atacante no autenticado acceda a información que, de otra forma, estaría restringida. Un atacante puede emplear erróneamente la función de autenticación del servidor de SAP HANA en su interfaz de SQL y revelar 8 bytes de la memoria del proceso del servidor. • http://www.securityfocus.com/bid/102997 https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018 https://launchpad.support.sap.com/#/notes/2572940 •

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 0

A remote unauthenticated attacker, SAP HANA 1.00 and 2.00, could send specially crafted SOAP requests to the SAP Startup Service and disclose information such as the platform's hostname. Un atacante remoto no autenticado en SAP HANA 1.00 y 2.00 podría enviar peticiones SOAP especialmente manipuladas a SAP Startup Service y revelar información como el nombre del host de la plataforma. • http://www.securityfocus.com/bid/102452 https://blogs.sap.com/2018/01/09/sap-security-patch-day-january-2018 https://launchpad.support.sap.com/#/notes/2575750 •

CVSS: 8.1EPSS: 1%CPEs: 1EXPL: 0

The SQL interface in SAP HANA before Revision 102 does not limit the number of login attempts for the SYSTEM user when the password_lock_for_system_user is not supported or is configured as "False," which makes it easier for remote attackers to bypass authentication via a brute force attack, aka SAP Security Note 2216869. La interfaz SQL en SAP HANA en versiones anteriores a Revision 102 no limita el número de intentos de inicio de sesión para el usuario SYSTEM cuando el password_lock_for_system_user no es apoyado o está configurado como "False," lo que facilita a atacantes remotos eludir la autenticación a través de un ataque de fuerza bruta, también conocido como SAP Security Note 2216869. • http://packetstormsecurity.com/files/138443/SAP-HANA-DB-1.00.73.00.389160-SYSTEM-User-Brute-Force.html http://seclists.org/fulldisclosure/2016/Aug/91 http://www.securityfocus.com/bid/92065 https://www.onapsis.com/blog/onapsis-publishes-15-advisories-sap-hana-and-building-components https://www.onapsis.com/research/security-advisories/sap-hana-system-user-brute-force-attack • CWE-284: Improper Access Control •

CVSS: 10.0EPSS: 6%CPEs: 1EXPL: 0

SAP HANA Database 1.00 SPS10 and earlier do not require authentication, which allows remote attackers to execute arbitrary code or have unspecified other impact via a TrexNet packet to the (1) fcopydir, (2) fmkdir, (3) frmdir, (4) getenv, (5) dumpenv, (6) fcopy, (7) fput, (8) fdel, (9) fmove, (10) fget, (11) fappend, (12) fdir, (13) getTraces, (14) kill, (15) pexec, (16) stop, or (17) pythonexec method, aka SAP Security Note 2165583. SAP HANA Database 1.00 SPS10 y anteriores no requiere autenticación, lo que permite a atacantes remotos ejecutar código arbitrario o tener otro impacto no especificado a través de un paquete TrexNet al método (1) fcopydir, (2) fmkdir, (3) frmdir, (4) getenv, (5) dumpenv, (6) fcopy, (7) fput, (8) fdel, (9) fmove, (10) fget, (11) fappend, (12) fdir, (13) getTraces, (14) kill, (15) pexec, (16) stop o (17) pythonexec, también conocida como SAP Security Note 2165583. • http://packetstormsecurity.com/files/134281/SAP-HANA-TrexNet-Command-Execution.html http://seclists.org/fulldisclosure/2015/Nov/36 https://www.onapsis.com/blog/analyzing-sap-security-notes-august-2015-edition • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 38%CPEs: 1EXPL: 2

The index server (hdbindexserver) in SAP HANA 1.00.095 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via an HTTP request, aka SAP Security Note 2197428. El servidor index (hdbindexserver) en SAP HANA 1.00.095 permite a atacantes remotos ejecutar código arbitrario o provocar una denegación de servicio (corrupción de memoria) a través de una petición HTTP, también conocida como SAP Security Note 2197428. • https://www.exploit-db.com/exploits/39382 http://packetstormsecurity.com/files/135416/SAP-HANA-hdbindexserver-Memory-Corruption.html http://scn.sap.com/community/security/blog/2015/10/14/sap-security-notes-october-2015--review http://seclists.org/fulldisclosure/2016/Jan/94 http://www.securityfocus.com/archive/1/537376/100/0/threaded https://erpscan.io/advisories/erpscan-15-024-sap-hana-hdbindexserver-memory-corruption • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •