Vigil@nce - SAP: spoofing signature
October 2014 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can sign malicious SAP documents, in order to deceive
recipients.
Impacted products: SAP ERP, NetWeaver
Severity: 2/4
Creation date: 16/10/2014
DESCRIPTION OF THE VULNERABILITY
SAP products use the SAPCRYPTOLIB, SAPSECULIB and CommonCryptoLib
cryptographic libraries.
However, an attacker can use these libraries to create a fake DSA
(Digital Signature Algorithm) signature.
An attacker can therefore sign malicious SAP documents, in order
to deceive recipients.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/SAP-spoofing-signature-15498