Description
lserver in SAP DB 7.3 and earlier uses the current working directory to find and execute the lserversrv program, which allows local users to gain privileges with a malicious lserversrv that is called from a directory that has a symlink to the lserver program.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by SAP Security · textlocalunix
https://www.exploit-db.com/exploits/22067
References (4)
Core 4
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/10762
Exploit, Patch, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/6316
Patch x_refsource_confirm
http://www.sapdb.org/sap_db_alert.htm
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=103903565829796&w=2
Scores
EPSS
0.0062
EPSS Percentile
70.2%
Details
Status
published
Products (1)
sap/sap_db
7.3.00
Published
Apr 15, 2004
Tracked Since
Feb 18, 2026