First published: Mon Mar 29 2010(Updated: )
Stack-based buffer overflow in serv.exe in SAP MaxDB 7.4.3.32, and 7.6.0.37 through 7.6.06 allows remote attackers to execute arbitrary code via an invalid length parameter in a handshake packet to TCP port 7210. NOTE: some of these details are obtained from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SAP MaxDB | =7.6.06 | |
SAP MaxDB | =7.6.0.37 | |
SAP MaxDB | =7.4.3.32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1185 is classified as a high severity vulnerability due to its potential for remote code execution.
To mitigate CVE-2010-1185, upgrade SAP MaxDB to a version that is not affected, such as versions beyond 7.6.06.
CVE-2010-1185 can be exploited by remote attackers sending specially crafted handshake packets to the affected service.
CVE-2010-1185 affects SAP MaxDB versions 7.4.3.32, 7.6.0.37, and 7.6.06.
A valid workaround for CVE-2010-1185 includes restricting access to the TCP port 7210 to trusted hosts only.