Advisory
On 10.03.2015 a security relevant correction has been released by SAP SE. The manufacturer resolves an issue within HCM.
SAP Note 2129892 addresses "Potential Buffer overflow in PA-PAO" to prevent remote code execution with a high risk for exploitation.
A workaround does not exist, according to SAP Security Advisory team. It is advisable to implement the correction as monthly patch process, the team suggests.
Risk specification
An attacker may use the vulnerability to inject code into the working memory that is subsequently executed by the application.Solution
Customers must follow the description of the note and apply a manual correction preventing a program error. The buffer overflow potential can be eliminated by following the steps described in the correct.
The advisory is valid for
- EA-HRRXX 607
- EA-HRRXX 608
- 10.0 [CVE-2023-27497] Multiple vulnerabilities in SAP Diagnostics Agent (OSCommand Bridge and EventLogServiceCollector)
- 9.8 [CVE-2022-22965] Remote Code Execution vulnerability associated with Spring Framework used in SAP Customer Profitability Analytics
- 9.8 [CVE-2022-22965] Remote Code Execution vulnerability associated with Spring Framework used in SAP Customer Checkout
- 9.8 [CVE-2022-22965] Remote Code Execution vulnerability associated with Spring Framework used in SAP HANA Extended Application Services
- 9.8 [CVE-2022-22965] Remote Code Execution vulnerability associated with Spring Framework used in PowerDesigner Web (up to including 16.7 SP05 PL01)