First published: Wed Aug 15 2012(Updated: )
Multiple stack-based buffer overflows in msg_server.exe in SAP NetWeaver ABAP 7.x allow remote attackers to cause a denial of service (crash) and execute arbitrary code via a (1) long parameter value, (2) crafted string size field, or (3) long Parameter Name string in a package with opcode 0x43 and sub opcode 0x4 to TCP port 3900.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver AS ABAP | =7.0 | |
SAP NetWeaver AS ABAP | =7.02-sp6 | |
SAP NetWeaver AS ABAP | =7.03-sp4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4341 is considered critical due to its potential to allow remote code execution and denial of service.
To fix CVE-2012-4341, apply the latest patches and updates provided by SAP for affected versions of NetWeaver ABAP.
CVE-2012-4341 affects SAP NetWeaver ABAP versions 7.0, 7.02-sp6, and 7.03-sp4.
Yes, CVE-2012-4341 can be exploited remotely by sending specially crafted parameters to msg_server.exe.
Exploitation of CVE-2012-4341 can lead to system crashes, code execution, and unauthorized access.