SAP Crystal Reports crystalras.exe OBUnmarshal Remote Code Execution VulnerabilityZDI-12-139: August 17th, 2012
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of SAP Crystal Reports. Authentication is not required to exploit this vulnerability.
The flaw exists within the ebus-3-3-2-7.dll component which is used by the crystalras.exe service. This process listens on a random TCP port. When unmarshalling GIOP ORB encapsulated data the process invokes a memcpy constrained by a user controlled value. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the SYSTEM user.
Vendor ResponseSAP has issued an update to correct this vulnerability. More details can be found at:
2011-11-21 - Vulnerability reported to vendor
2012-08-17 - Coordinated public release of advisory
CreditThis vulnerability was discovered by: