Fed's New Rate Hike Eye Infections Money-Saving Tips Huawei Watch Ultimate Adobe's Generative AI Tips to Get More Exercise 12 Healthy Spring Recipes Watch March Madness
Want CNET to notify you of price drops and the latest stories?
No, thank you

SAP patches critical security flaws

Critical security flaws patched in EnjoySAP and SAP Web Application Server, as well as more moderate security vulnerability in SAP Message Server, according to advisory issued by Next Generation Security Software (NGSS).

SAP has patched highly critical security flaws in EnjoySAP and SAP Web Application Server, as well as moderate vulnerabilities in its SAP Message Server, according to security advisories issued Friday by Mark Litchfield of Next Generation Security Software.

Security flaws in EnjoySAP were found due to ActiveX controls "kweditcontrol.kwedit.1" and "preparetopostHTML," which could allow a buffer overflow attack and remote access to users' systems, according to Litchfield, who discovered the flaws.

EnjoySAP is one of the more popular SAP GUIs, noted Litchfield in his advisory, which stated all platforms are affected.

SAP Web Application Server's Internet Communication Manager running on Windows was also found to have highly critical security flaws, according to the advisory. The ICM allows communication between the SAP Web Application Server and HTTP, HTTPS and SMTP protocols.

But an error in the Internet Communication Manager's ICMAN.exe component can be exploited, leading to a denial-of-service attack.

"This is a very effective denial-of-service attack within a SAP environment," Litchfield stated in his advisory.

A more moderate security flaw was found in SAP Message Server running on all platforms, which can be exploited when a boundary error occurs during processing of HTTP requests. That can lead to a buffer overflow attack and remote execution of arbitrary code, according to NGSS' advisory.