First published: Tue May 15 2012(Updated: )
The DiagTraceR3Info function in the Dialog processor in disp+work.exe 7010.29.15.58313 and 7200.70.18.23869 in the Dispatcher in SAP NetWeaver 7.0 EHP1 and EHP2, when a certain Developer Trace configuration is enabled, allows remote attackers to execute arbitrary code via a crafted SAP Diag packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver | =7.0-ehp1 | |
SAP NetWeaver | =7.0-ehp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2611 has a critical severity rating due to its potential for remote code execution.
To fix CVE-2012-2611, apply the latest patches and updates from SAP for affected versions of the NetWeaver software.
CVE-2012-2611 affects SAP NetWeaver versions 7.0 EHP1 and EHP2.
CVE-2012-2611 allows remote attackers to execute arbitrary code via a crafted SAP Diag packet.
As a temporary workaround for CVE-2012-2611, you can disable the Developer Trace configuration in the Dispatcher settings.