---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ International Partner Manager - Project Sales in the IT-Security Industry: http://corporate.secunia.com/about_secunia/64/ ---------------------------------------------------------------------- TITLE: MaxDB "dbmsrv" Privilege Escalation Vulnerability SECUNIA ADVISORY ID: SA31318 VERIFY ADVISORY: http://secunia.com/advisories/31318/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system SOFTWARE: MaxDB 7.x http://secunia.com/product/4012/ DESCRIPTION: A vulnerability has been reported in MaxDB, which can be exploited by malicious, local users to gain escalated privileges. The vulnerability is caused due to the "dbmsrv" application improperly checking the "PATH" environment variable when executed via "dbmcli". This can be exploited to execute arbitrary code with "sdb" user privileges and "sdba" group privileges via a specially crafted "PATH". The vulnerability is reported in version 7.6.03.15 on Linux. Other versions may also be affected. SOLUTION: The vendor has released a new version that fixes the vulnerability. Consult SAP Note 1178438 for more information. PROVIDED AND/OR DISCOVERED BY: anonymous researcher, reported via iDefense ORIGINAL ADVISORY: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=729 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------