First published: Tue Jul 11 2023(Updated: )
SAP SQL Anywhere - version 17.0, allows an attacker to prevent legitimate users from accessing the service by crashing the service. An attacker with low privileged account and access to the local system can write into the shared memory objects. This can be leveraged by an attacker to perform a Denial of Service. Further, an attacker might be able to modify sensitive data in shared memory objects.This issue only affects SAP SQL Anywhere on Windows. Other platforms are not impacted.
Credit: cna@sap.com cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP SQL Anywhere | =17.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this SAP SQL Anywhere vulnerability is CVE-2023-33990.
The severity rating of CVE-2023-33990 is 7.1, which is classified as high.
CVE-2023-33990 allows an attacker to prevent legitimate users from accessing the service by crashing the service in SAP SQL Anywhere version 17.0.
Anyone using SAP SQL Anywhere version 17.0 is affected by the CVE-2023-33990 vulnerability.
Yes, SAP has released a fix for CVE-2023-33990. It is recommended to update to the latest version or apply the provided patches.