Skip links

Potential remote code execution in SAP Kernel, SAP security note 1487330

Description

This security note has been updated. For more detailed information, see Security Note 1529807.
A malicious user can exploit Kernel functions to enable them to take complete control of the product, including viewing, changing, or deleting data.

Available fix and Supported packages

  • KRNL32NUC | 4.6DEXT | 4.6DEX2
  • KRNL32NUC | 6.40 | 6.40EX2
  • KRNL32NUC | 7.00 | 7.01
  • KRNL32NUC | 7.10 | 7.20
  • KRNL32NUC | 7.20EXT | 7.20EXT
  • KRNL32UC | 6.40 | 6.40EX2
  • KRNL32UC | 7.00 | 7.01
  • KRNL32UC | 7.10 | 7.20
  • KRNL32UC | 7.20EXT | 7.20EXT
  • KRNL64NUC | 4.6DEXT | 4.6DEX2
  • KRNL64NUC | 6.40 | 6.40EX2
  • KRNL64NUC | 7.00 | 7.01
  • KRNL64NUC | 7.10 | 7.20
  • KRNL64NUC | 7.20EXT | 7.20EXT
  • KRNL64UC | 6.40 | 6.40EX2
  • KRNL64UC | 7.00 | 7.01
  • KRNL64UC | 7.10 | 7.20
  • KRNL64UC | 7.2L | 7.2L
  • KRNL64UC | 7.20EXT | 7.20EXT
  • SAP_BASIS | 46C | 46D
  • SAP KERNEL 4.6D_EX2 32-BIT | SP2538 | 002538
  • SAP KERNEL 4.6D_EX2 64-BIT | SP2538 | 002538
  • SAP KERNEL 4.6D_EXT 32-BIT | SP2538 | 002538
  • SAP KERNEL 4.6D_EXT 64-BIT | SP2538 | 002538
  • SAP KERNEL 6.40 32-BIT | SP339 | 000339
  • SAP KERNEL 6.40 32-BIT UNICODE | SP339 | 000339
  • SAP KERNEL 6.40 64-BIT | SP339 | 000339
  • SAP KERNEL 6.40 64-BIT UNICODE | SP339 | 000339
  • SAP KERNEL 6.40_EX2 32-BIT | SP339 | 000339
  • SAP KERNEL 6.40_EX2 32-BIT UC | SP339 | 000339
  • SAP KERNEL 6.40_EX2 64-BIT | SP339 | 000339
  • SAP KERNEL 6.40_EX2 64-BIT UC | SP339 | 000339
  • SAP KERNEL 7.00 32-BIT | SP265 | 000265
  • SAP KERNEL 7.00 32-BIT UNICODE | SP265 | 000265
  • SAP KERNEL 7.00 64-BIT | SP265 | 000265
  • SAP KERNEL 7.00 64-BIT UNICODE | SP265 | 000265
  • SAP KERNEL 7.01 32-BIT | SP103 | 000103
  • SAP KERNEL 7.01 32-BIT UNICODE | SP103 | 000103
  • SAP KERNEL 7.01 64-BIT | SP103 | 000103
  • SAP KERNEL 7.01 64-BIT UNICODE | SP103 | 000103

Affected component

    BC-CCM-CNF-PFL
    Profile Maintenance

CVSS

Score: 0

Exploit

Exploit is not available.
For detailed information please contact the mail [email protected]

URL

https://launchpad.support.sap.com/#/notes/1487330

TAGS

#Buffer-overrun
#rce
#Kernel