Description
Stack-based buffer overflow in serv.exe in SAP MaxDB 7.4.3.32, and 7.6.0.37 through 7.6.06 allows remote attackers to execute arbitrary code via an invalid length parameter in a handshake packet to TCP port 7210. NOTE: some of these details are obtained from third party information.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by S2 Crew · pythonremotewindows
https://www.exploit-db.com/exploits/11886
References (8)
Core 8
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/63047
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/56950
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id?1023719
Third Party Advisory x_refsource_misc
http://www.zerodayinitiative.com/advisories/ZDI-10-032/
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/38769
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/510125/100/0/threaded
Vendor Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2010/0643
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/38955
Scores
EPSS
0.3660
EPSS Percentile
97.2%
Details
CWE
CWE-119
Status
published
Products (3)
sap/maxdb
7.4.3.32
sap/maxdb
7.6.0.37
sap/maxdb
7.6.06
Published
Mar 29, 2010
Tracked Since
Feb 18, 2026