Skip to content

Instantly share code, notes, and snippets.

@MILPDS
Last active June 27, 2024 11:30
Show Gist options
  • Save MILPDS/e9da6d07ba1789defacec08f2f03293d to your computer and use it in GitHub Desktop.
Save MILPDS/e9da6d07ba1789defacec08f2f03293d to your computer and use it in GitHub Desktop.
CVE-2024-37571
### CVE Vulnerability Disclosure
**CVE-ID:** CVE-2024-37571
**Description:**
An issue was discovered in SAS Broker 9.2 build 1495. Crafting an integer overflow condition in the debug functionality allows a user to achieve a denial of service (DoS) and/or retrieve information about the software version and build number.
**Vulnerability Type:**
Buffer Overflow
**Vendor of Product:**
SAS: Data and AI Solutions
[https://www.sas.com/en_us/home.html](https://www.sas.com/en_us/home.html)
**Affected Product Code Base:**
SAS Broker - V9.2, build 1495
**Affected Component:**
Affected function
**Attack Type:**
Remote
**Impact Denial of Service:**
True
**Impact Information Disclosure:**
True
**Attack Vectors:**
To exploit this vulnerability, the user crafts a large integer payload for the `_debug` parameter. This causes an integer overflow, resulting in the application displaying an error page revealing the software's version and build number. Additionally, the application may restart unexpectedly.
**Reference:**
[https://www.sas.com/en_us/home.html](https://www.sas.com/en_us/home.html)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment