SAP SAPgui MDrmSap ActiveX (mdrmsap.dll) Buffer Overflow

This script is Copyright (C) 2009-2013 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has an ActiveX control that is affected by a
buffer overflow vulnerability.

Description :

The remote host contains the 'MDrmSap' ActiveX control included with
SAP GUI version 6.40 for Windows.

This control is reportedly affected by a buffer overflow involving
instantiation by Internet Explorer.

If an attacker can trick a user on the affected host into visiting a
specially crafted web page, he may be able to leverage these issues to
execute arbitrary code on the host subject to the user's privileges.

The existence of this vulnerability is confirmed in mdrmsap.dll version
3.5.1.635. Previous versions may also be affected.

See also :

http://service.sap.com/sap/support/notes/1142431

Solution :

Apply the patch for the control as described in the vendor advisory.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.3
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 40617 ()

Bugtraq ID: 32186

CVE ID: CVE-2008-4387

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now