Description
A malicious user can remotely exploit the sapstartsrv process to manually terminate it.
Available fix and Supported packages
- KRNL32NUC | 6.40 | 6.40
- KRNL32NUC | 7.00 | 7.00
- KRNL32UC | 6.40 | 6.40
- KRNL32UC | 7.00 | 7.00
- KRNL64NUC | 6.40 | 6.40
- KRNL64NUC | 7.00 | 7.00
- KRNL64UC | 6.40 | 6.40
- KRNL64UC | 7.00 | 7.00
- SAP KERNEL 6.40 32-BIT | SP227 | 000227
- SAP KERNEL 6.40 32-BIT UNICODE | SP227 | 000227
- SAP KERNEL 6.40 64-BIT | SP227 | 000227
- SAP KERNEL 6.40 64-BIT UNICODE | SP227 | 000227
- SAP KERNEL 7.00 32-BIT | SP155 | 000155
- SAP KERNEL 7.00 32-BIT UNICODE | SP155 | 000155
- SAP KERNEL 7.00 64-BIT | SP155 | 000155
- SAP KERNEL 7.00 64-BIT UNICODE | SP155 | 000155
Affected component
- BC-CST-STS
Startup Service
CVSS
Score: 0
PoC
Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.
URL
https://launchpad.support.sap.com/#/notes/1151410