ID

VAR-200707-0487


CVE

CVE-2007-3615


TITLE

Windows Run on SAP NetWeaver Application Server of Internet Communication Manager Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2007-005833

DESCRIPTION

Internet Communication Manager (aka ICMAN.exe or ICM) in SAP NetWeaver Application Server 6.x and 7.x, possibly only on Windows, allows remote attackers to cause a denial of service (process crash) via a URI of a certain length that contains a sap-isc-key parameter, related to configuration of a web cache. Internet Communication Manager is prone to a remote denial-of-service vulnerability. A remote attacker can exploit this issue to cause the affected service to crash, effectively denying service to legitimate users. ---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/ The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. The vulnerability is caused due to an error within the Internet Communication Manager (ICM - ICMAN.exe) component and can be exploited to crash the ICM process by requesting an overly long (around 264 bytes), specially crafted URI. SOLUTION: Update to the latest version. PROVIDED AND/OR DISCOVERED BY: Mark Litchfield, NGSSoftware ORIGINAL ADVISORY: http://www.ngssoftware.com/advisories/high-risk-vulnerability-in-internet-communication-manager-dos/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.98

sources: NVD: CVE-2007-3615 // JVNDB: JVNDB-2007-005833 // BID: 24774 // PACKETSTORM: 57474

AFFECTED PRODUCTS

vendor:sapmodel:web application serverscope:eqversion:7.0.10

Trust: 1.3

vendor:sapmodel:web application serverscope:eqversion:7.0

Trust: 1.3

vendor:sapmodel:web application serverscope:eqversion:6.40

Trust: 1.3

vendor:sapmodel:web application serverscope:eqversion:6.20

Trust: 1.3

vendor:sapmodel:web application serverscope:eqversion:6.10

Trust: 1.3

vendor:sapmodel:internet communication managerscope:eqversion:*

Trust: 1.0

vendor:sapmodel:internet communication managerscope: - version: -

Trust: 0.8

vendor:sapmodel:web application serverscope:eqversion:6.x and 7.x

Trust: 0.8

vendor:microsoftmodel:all windowsscope: - version: -

Trust: 0.6

vendor:sapmodel:internet communication managerscope:eqversion:0

Trust: 0.3

sources: BID: 24774 // JVNDB: JVNDB-2007-005833 // CNNVD: CNNVD-200707-111 // NVD: CVE-2007-3615

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-3615
value: HIGH

Trust: 1.0

NVD: CVE-2007-3615
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200707-111
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2007-3615
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2007-005833 // CNNVD: CNNVD-200707-111 // NVD: CVE-2007-3615

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2007-3615

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200707-111

TYPE

Design Error

Trust: 0.9

sources: BID: 24774 // CNNVD: CNNVD-200707-111

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-005833

PATCH

title:NetWeaver Application Serverurl:http://www.sap.com/solutions/netweaver/webappserver/index.asp

Trust: 0.8

sources: JVNDB: JVNDB-2007-005833

EXTERNAL IDS

db:NVDid:CVE-2007-3615

Trust: 2.7

db:BIDid:24774

Trust: 1.9

db:SECUNIAid:25964

Trust: 1.7

db:SREASONid:2875

Trust: 1.6

db:SECTRACKid:1018336

Trust: 1.6

db:VUPENid:ADV-2007-2450

Trust: 1.6

db:OSVDBid:38095

Trust: 1.0

db:JVNDBid:JVNDB-2007-005833

Trust: 0.8

db:XFid:35278

Trust: 0.6

db:BUGTRAQid:20070705 INTERNET COMMUNICATION MANAGER DENIAL OF SERVICE ATTACK

Trust: 0.6

db:CNNVDid:CNNVD-200707-111

Trust: 0.6

db:PACKETSTORMid:57474

Trust: 0.1

sources: BID: 24774 // JVNDB: JVNDB-2007-005833 // PACKETSTORM: 57474 // CNNVD: CNNVD-200707-111 // NVD: CVE-2007-3615

REFERENCES

url:http://www.ngssoftware.com/advisories/high-risk-vulnerability-in-internet-communication-manager-dos/

Trust: 1.7

url:http://secunia.com/advisories/25964

Trust: 1.6

url:http://www.securityfocus.com/bid/24774

Trust: 1.6

url:http://www.securitytracker.com/id?1018336

Trust: 1.6

url:http://securityreason.com/securityalert/2875

Trust: 1.6

url:http://archives.neohapsis.com/archives/fulldisclosure/2007-07/0105.html

Trust: 1.0

url:http://osvdb.org/38095

Trust: 1.0

url:http://www.vupen.com/english/advisories/2007/2450

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/35278

Trust: 1.0

url:http://www.securityfocus.com/archive/1/472890/100/0/threaded

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-3615

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-3615

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/472890/100/0/threaded

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2007/2450

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/35278

Trust: 0.6

url:http://help.sap.com/saphelp_nw04/helpdata/en/0a/a7903febb15a7be10000000a11405a/content.htm

Trust: 0.3

url:http://help.sap.com/saphelp_nw04s/helpdata/en/9f/89e2edfde645fca1636fa8468d2e74/content.htm

Trust: 0.3

url:http://www.sap.com

Trust: 0.3

url:/archive/1/472890

Trust: 0.3

url:http://secunia.com/product/6087/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/network_software_inspector/

Trust: 0.1

url:http://secunia.com/advisories/25964/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/3327/

Trust: 0.1

sources: BID: 24774 // JVNDB: JVNDB-2007-005833 // PACKETSTORM: 57474 // CNNVD: CNNVD-200707-111 // NVD: CVE-2007-3615

CREDITS

Mark Litchfield※ mark@ngssoftware.com

Trust: 0.6

sources: CNNVD: CNNVD-200707-111

SOURCES

db:BIDid:24774
db:JVNDBid:JVNDB-2007-005833
db:PACKETSTORMid:57474
db:CNNVDid:CNNVD-200707-111
db:NVDid:CVE-2007-3615

LAST UPDATE DATE

2025-04-10T23:07:26.259000+00:00


SOURCES UPDATE DATE

db:BIDid:24774date:2015-05-07T17:37:00
db:JVNDBid:JVNDB-2007-005833date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-200707-111date:2007-07-10T00:00:00
db:NVDid:CVE-2007-3615date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:BIDid:24774date:2007-07-05T00:00:00
db:JVNDBid:JVNDB-2007-005833date:2012-12-20T00:00:00
db:PACKETSTORMid:57474date:2007-07-06T22:02:34
db:CNNVDid:CNNVD-200707-111date:2007-07-06T00:00:00
db:NVDid:CVE-2007-3615date:2007-07-06T19:30:00