Description
This security note has been updated. For more detailed information, see security notes 1633982 and 1697971.
Other SAP Notes refer to the parameter gw/reg_no_conn_info to configure the security settings of the gateway. These SAP Notes do not provide any concrete values for the parameter, however.
Available fix and Supported packages
- KRNL32NUC | 4.6DEXT | 4.6DEX2
- KRNL32NUC | 6.40 | 6.40EX2
- KRNL32NUC | 7.00 | 7.01
- KRNL32NUC | 7.10 | 7.20
- KRNL32NUC | 7.20EXT | 7.20EXT
- KRNL32UC | 6.40 | 6.40EX2
- KRNL32UC | 7.00 | 7.01
- KRNL32UC | 7.10 | 7.20
- KRNL32UC | 7.20EXT | 7.20EXT
- KRNL64NUC | 4.6DEXT | 4.6DEX2
- KRNL64NUC | 6.40 | 6.40EX2
- KRNL64NUC | 7.00 | 7.01
- KRNL64NUC | 7.10 | 7.20
- KRNL64NUC | 7.20EXT | 7.20EXT
- KRNL64UC | 6.40 | 6.40EX2
- KRNL64UC | 7.00 | 7.01
- KRNL64UC | 7.10 | 7.20
- KRNL64UC | 7.2L | 7.2L
- KRNL64UC | 7.20EXT | 7.20EXT
- KERNEL | 4.6D | 4.6D
- SAP KERNEL 7.20 32-BIT | SP057 | 000057
- SAP KERNEL 7.20 32-BIT UNICODE | SP057 | 000057
- SAP KERNEL 7.20 64-BIT | SP057 | 000057
- SAP KERNEL 7.20 64-BIT UNICODE | SP057 | 000057
Affected component
- BC-CST-GW
Gateway/CPIC
CVSS
Score: 0
PoC
Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.
URL
https://launchpad.support.sap.com/#/notes/1444282