First published: Mon Aug 14 2006(Updated: )
Heap-based buffer overflow in SAP Internet Graphics Service (IGS) 6.40 and earlier, and 7.00 and earlier, allows remote attackers to cause a denial of service (crash) or execute arbitrary code via an HTTP request with an ADM:GETLOGFILE command and a long portwatcher argument, which triggers the overflow during error message construction when the _snprintf function returns a negative value that is used in a memcpy operation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Internet Graphics Server | =6.40 | |
SAP Internet Graphics Server | =6.40_patch_11 | |
SAP Internet Graphics Server | =6.40_patch_15 | |
SAP Internet Graphics Server | =7.00_patch_3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4133 is classified as a critical vulnerability due to its potential to allow remote code execution.
To fix CVE-2006-4133, upgrade to a patched version of SAP Internet Graphics Service that addresses this buffer overflow issue.
CVE-2006-4133 affects SAP Internet Graphics Service versions 6.40 and 7.00, specifically patch levels 11, 15, and 3.
CVE-2006-4133 is associated with a remote denial of service and the potential for arbitrary code execution through malicious HTTP requests.
Yes, CVE-2006-4133 can be exploited remotely by attackers sending specifically crafted HTTP requests.