Vulnerability Details : CVE-2006-4305
Buffer overflow in SAP DB and MaxDB before 7.6.00.30 allows remote attackers to execute arbitrary code via a long database name when connecting via a WebDBM client.
Vulnerability category: OverflowExecute code
At least one public exploit which can be used to exploit this vulnerability exists!
Exploit prediction scoring system (EPSS) score for CVE-2006-4305
Probability of exploitation activity in the next 30 days: 96.50%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 99 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2006-4305
-
MaxDB WebDBM Database Parameter Overflow
Disclosure Date : 2006-08-29exploit/windows/http/maxdb_webdbm_databaseThis module exploits a stack buffer overflow in the MaxDB WebDBM service. By sending a specially-crafted HTTP request that contains an overly long database name. A remote attacker could overflow a buffer and execute arbitrary code on the system with privileges of the wahttp process. This module has been tested against MaxDB 7.6.00.16 and MaxDB 7.6.00.27. Authors: - MC <[email protected]>
CVSS scores for CVE-2006-4305
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
[email protected] |
References for CVE-2006-4305
-
http://www.securityfocus.com/bid/19660
Patch
-
http://www.securityfocus.com/archive/1/444601/100/0/threaded
-
http://securitytracker.com/id?1016766
Vendor Advisory
-
http://www.vupen.com/english/advisories/2006/3410
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/28636
-
http://dev.mysql.com/doc/maxdb/changes/changes_7.6.00.32.html
-
http://www.debian.org/security/2006/dsa-1190
Patch;Vendor Advisory
Products affected by CVE-2006-4305
- cpe:2.3:a:mysql:maxdb:*:*:*:*:*:*:*:*
- cpe:2.3:a:sap-db:sap-db:*:*:*:*:*:*:*:*