Solution : https://service.sap.com/sap/support/notes/1421005 (Connexion à SAP Service Marketplace requise)
Résumé :
Malicious clients have the potential to log onto SAP's message server as an application server. This note explains securing message servers by preventing external access through specific configurations. Key steps include ensuring correct kernel patch levels (6.40-7.20), designating an internal message server port distinct from the standard port, and setting up a message server access list using the ms/acl_info parameter. Additionally, for kernel version 46D and older setups (3.1I, 4.0B, 4.5B), where such configurations are unavailable, implementing robust firewall rules around the server network to control message server access is recommended.
Mots Clés :
terms rdisp/msservrdisp/msserv_internal reason, correct kernel patch level, kernel release patch level 6, message server access list, standard message server port, internal message server ports, internal message server port, minimum patch level, kernel patch level 2508, access control entries
Notes associées :
| 1504652 | |
| 888889 | Automatic checks for security notes using RSECNOTE |
| 821875 | Security settings in the message server |