First published: Tue Nov 07 2006(Updated: )
Unspecified vulnerability in enserver.exe in SAP Web Application Server 6.40 before patch 136 and 7.00 before patch 66 allows remote attackers to read arbitrary files via crafted data on a "3200+SYSNR" TCP port, as demonstrated by port 3201. NOTE: this issue can be leveraged by local users to access a named pipe as the SAPServiceJ2E user.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Web Application Server | =7.00 | |
SAP Web Application Server | =6.40 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5784 is categorized as a vulnerability allowing unauthorized file access, posing a significant risk to affected systems.
To address CVE-2006-5784, apply the relevant patches for SAP Web Application Server 6.40 and 7.00 as specified by SAP.
CVE-2006-5784 affects SAP Web Application Server versions 6.40 prior to patch 136 and 7.00 prior to patch 66.
CVE-2006-5784 can be exploited by remote attackers sending crafted data to specific TCP ports, allowing unauthorized file reading.
CVE-2006-5784 is a remote vulnerability that can also be leveraged by local users to gain unauthorized access.