CVE-2008-1810
https://notcve.org/view.php?id=CVE-2008-1810
Untrusted search path vulnerability in dbmsrv in SAP MaxDB 7.6.03.15 on Linux allows local users to gain privileges via a modified PATH environment variable. Vulnerabilidad de búsqueda de ruta no confiable en dbmsrv en SAP MaxDB 7.6.03.15 sobre Linux. Permite a usuarios locales elevar sus privilegios a través de una variable de entorno PATH modificada. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=729 http://secunia.com/advisories/31318 http://www.securityfocus.com/bid/30474 http://www.securitytracker.com/id?1020585 http://www.vupen.com/english/advisories/2008/2267/references https://exchange.xforce.ibmcloud.com/vulnerabilities/44125 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2008-0307
https://notcve.org/view.php?id=CVE-2008-0307
Integer signedness error in vserver in SAP MaxDB 7.6.0.37, and possibly other versions, allows remote attackers to execute arbitrary code via unknown vectors that trigger heap corruption. Error de presencia de signo en entero en vserver en SAP MaxDB 7.6.0.37, y posiblemente otras versiones permite a atacantes remotos ejecutar código de su elección mediante vectores no especificados que disparan una corrupción de pila. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=669 http://secunia.com/advisories/29312 http://www.securityfocus.com/bid/28183 http://www.securitytracker.com/id?1019571 http://www.vupen.com/english/advisories/2008/0844/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41107 • CWE-189: Numeric Errors •
CVE-2008-0306
https://notcve.org/view.php?id=CVE-2008-0306
sdbstarter in SAP MaxDB 7.6.0.37, and possibly other versions, allows local users to execute arbitrary commands by using unspecified environment variables to modify configuration settings. sdbstarter en SAP MaxDB 7.6.0.37, y posiblemente en otras versiones, permite a usuarios locales ejecutar comandos de su elección mediante utilizando variables de entorno no especificadas para mnodificar parámetros de configuración. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=670 http://secunia.com/advisories/29312 http://www.securityfocus.com/bid/28185 http://www.securitytracker.com/id?1019570 http://www.vupen.com/english/advisories/2008/0844/references https://exchange.xforce.ibmcloud.com/vulnerabilities/41104 •
CVE-2008-0244 – SAP MaxDB 7.6.03.07 - Remote Command Execution
https://notcve.org/view.php?id=CVE-2008-0244
SAP MaxDB 7.6.03 build 007 and earlier allows remote attackers to execute arbitrary commands via "&&" and other shell metacharacters in exec_sdbinfo and other unspecified commands, which are executed when MaxDB invokes cons.exe. SAP MaxDB 7.6.03 build 007 y versiones anteriores, permite que atacantes remotos ejecuten comandos arbitrarios usando "$$", además de otros metacarateres del intéprete de comandos (shell) en exec_sdbinfo, y de otros comandos no especificados, que se ejecutan cuando MaxDB invoca a cons.exe SAP MaxDB is prone to a remote command-injection vulnerability because the application fails to properly sanitize user-supplied input. • https://www.exploit-db.com/exploits/4877 http://aluigi.altervista.org/adv/sapone-adv.txt http://secunia.com/advisories/28409 http://securityreason.com/securityalert/3536 http://www.securityfocus.com/archive/1/486039/100/0/threaded http://www.securityfocus.com/bid/27206 http://www.securitytracker.com/id?1019171 http://www.vupen.com/english/advisories/2008/0104 https://exchange.xforce.ibmcloud.com/vulnerabilities/39573 - • CWE-20: Improper Input Validation •
CVE-2006-4305 – MaxDB WebDBM - 'Database' Remote Overflow
https://notcve.org/view.php?id=CVE-2006-4305
Buffer overflow in SAP DB and MaxDB before 7.6.00.30 allows remote attackers to execute arbitrary code via a long database name when connecting via a WebDBM client. Desbordamiento de búfer en SAP DB y MaxDB anterior a 7.6.00.30 permite a atacantes remotos ejecutar código arbitrario mediante un nombre de base de datos largo al conectar mediante el cliente WebDBM. • https://www.exploit-db.com/exploits/16765 http://dev.mysql.com/doc/maxdb/changes/changes_7.6.00.32.html http://secunia.com/advisories/21677 http://secunia.com/advisories/22518 http://securitytracker.com/id?1016766 http://www.debian.org/security/2006/dsa-1190 http://www.securityfocus.com/archive/1/444601/100/0/threaded http://www.securityfocus.com/bid/19660 http://www.symantec.com/enterprise/research/SYMSA-2006-009.txt http://www.vupen.com/english/advisories/2006/ •