### [CVE-2016-3979](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3979) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Internet Communication Manager (aka ICMAN or ICM) in SAP JAVA AS 7.2 through 7.4 allows remote attackers to cause a denial of service (heap memory corruption and process crash) via a crafted HTTP request, related to the IctParseCookies function, aka SAP Security Note 2256185. ### POC #### Reference - http://packetstormsecurity.com/files/137589/SAP-NetWeaver-AS-JAVA-7.4-icman-Denial-Of-Service.html - https://erpscan.io/advisories/erpscan-16-017-sap-java-icman-dos/ #### Github - https://github.com/Hwangtaewon/radamsa - https://github.com/StephenHaruna/RADAMSA - https://github.com/ameng929/netFuzz - https://github.com/nqwang/radamsa - https://github.com/sambacha/mirror-radamsa - https://github.com/sunzu94/radamsa-Fuzzer - https://github.com/vah13/SAP_vulnerabilities - https://github.com/vah13/netFuzz