Description
The message server can be abused by an attacker, allowing them to modify displayed application content without authorization, and to potentially obtain authentication information from other legitimate users.
Available fix and Supported packages
- KRNL32NUC | 7.21 | 7.21
- KRNL32NUC | 7.21EXT | 7.21EXT
- KRNL32UC | 7.21 | 7.21
- KRNL32UC | 7.21EXT | 7.21EXT
- KRNL64NUC | 7.21 | 7.21
- KRNL64NUC | 7.21EXT | 7.21EXT
- KRNL64NUC | 7.41 | 7.41
- KRNL64NUC | 7.42 | 7.42
- KRNL64NUC | 7.43 | 7.43
- KRNL64NUC | 7.44 | 7.44
- KRNL64NUC | 7.22 | 7.22
- KRNL64NUC | 7.22EXT | 7.22EXT
- KRNL64UC | 7.21 | 7.21
- KRNL64UC | 7.21EXT | 7.21EXT
- KRNL64UC | 7.41 | 7.41
- KRNL64UC | 7.42 | 7.42
- KRNL64UC | 7.43 | 7.43
- KRNL64UC | 7.44 | 7.44
- KRNL64UC | 7.22 | 7.22
- KRNL64UC | 7.22EXT | 7.22EXT
- SAP KERNEL 7.21 32-BIT | SP523 | 000523
- SAP KERNEL 7.21 32-BIT UNICODE | SP523 | 000523
- SAP KERNEL 7.21 64-BIT | SP523 | 000523
- SAP KERNEL 7.21 64-BIT UNICODE | SP523 | 000523
- SAP KERNEL 7.21 EXT 32-BIT | SP523 | 000523
- SAP KERNEL 7.21 EXT 32-BIT UC | SP523 | 000523
- SAP KERNEL 7.21 EXT 64-BIT | SP523 | 000523
- SAP KERNEL 7.21 EXT 64-BIT UC | SP523 | 000523
- SAP KERNEL 7.22 64-BIT | SP010 | 000010
- SAP KERNEL 7.22 64-BIT UNICODE | SP010 | 000010
- SAP KERNEL 7.22 EXT 64-BIT | SP010 | 000010
- SAP KERNEL 7.22 EXT 64-BIT UC | SP010 | 000010
- SAP KERNEL 7.41 64-BIT | SP229 | 000229
- SAP KERNEL 7.41 64-BIT UNICODE | SP229 | 000229
- SAP KERNEL 7.42 64-BIT | SP212 | 000212
- SAP KERNEL 7.42 64-BIT UNICODE | SP212 | 000212
- SAP KERNEL 7.43 64-BIT UNICODE | SP029 | 000029
- SAP KERNEL 7.44 64-BIT UNICODE | SP018 | 000018
- SAP KERNEL 7.45 64-BIT UNICODE | SP008 | 000008
Affected component
- BC-CST-MS
Message Service
CVSS
Score: 0
PoC
Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.
URL
https://launchpad.support.sap.com/#/notes/2189174