[VIM] Vendor clarification on CVE-2006-0732 (SAP Business Connector)

Steven M. Christey coley at mitre.org
Mon Feb 27 17:42:06 EST 2006


CVE was contacted by a representative of webMethods regarding
CVE-2006-0732.  As of 2006/02/27, details of the problem are not
available due to researcher's delayed disclosure.  However, the
webMethods representative wanted to provide some additional
clarification.  Since they do not go through public channels like
Bugtraq, they reviewed and agreed with my following summary of their
comments:

  SAP Business Connector is an OEM version of webMethods Integration
  Server.  webMethods states that this issue can only occur when the
  product is installed as root/admin, and if the attacker has access
  to a general purpose port; however, both are discouraged in the
  documentation.  In addition, the attacker must already have acquired
  administrative privileges through other means.


- Steve


======================================================
Name: CVE-2006-0732
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0732
Reference: BUGTRAQ:20060215 CYBSEC - Security Pre-Advisory: Arbitrary File Read/Delete in SAPBC
Reference: URL:http://www.securityfocus.com/archive/1/archive/1/425048/100/0/threaded
Reference: MISC:http://www.cybsec.com/vuln/CYBSEC_Security_Pre-Advisory_Arbitrary_File_Read_or_Delete_in_SAP_BC.pdf
Reference: BID:16668
Reference: URL:http://www.securityfocus.com/bid/16668
Reference: FRSIRT:ADV-2006-0611
Reference: URL:http://www.frsirt.com/english/advisories/2006/0611
Reference: SECTRACK:1015639
Reference: URL:http://securitytracker.com/id?1015639
Reference: SECUNIA:18880
Reference: URL:http://secunia.com/advisories/18880

Unspecified vulnerability in SAP Business Connector 4.6 and 4.7 allows
remote attackers to read or delete arbitrary files via unspecified
vectors.  NOTE: This information is based upon a vague initial
disclosure.  Details will be updated after the grace period has ended.
NOTE: SAP Business Connector is an OEM version of webMethods
Integration Server.  webMethods states that this issue can only occur
when the product is installed as root/admin, and if the attacker has
access to a general purpose port; however, both are discouraged in the
documentation.  In addition, the attacker must already have acquired
administrative privileges through other means.




More information about the VIM mailing list