Vulnerabilites related to sap - sapgui
CVE-2008-0621 (GCVE-0-2008-0621)
Vulnerability from cvelistv5
Published
2008-02-06 11:00
Modified
2024-08-07 07:54
Severity ?
CWE
  • n/a
Summary
Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands.
References
http://secunia.com/advisories/28786third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/487575/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2008/0409vdb-entry, x_refsource_VUPEN
http://www.securitytracker.com/id?1019300vdb-entry, x_refsource_SECTRACK
http://securityreason.com/securityalert/3619third-party-advisory, x_refsource_SREASON
http://www.securityfocus.com/archive/1/487508/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2008/0438vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/28811third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/27613vdb-entry, x_refsource_BID
https://www.exploit-db.com/exploits/5079exploit, x_refsource_EXPLOIT-DB
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:54:23.070Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "28786",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28786"
          },
          {
            "name": "20080205 Re: Multiple vulnerabilities in SAPlpd 6.28",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded"
          },
          {
            "name": "ADV-2008-0409",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0409"
          },
          {
            "name": "1019300",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019300"
          },
          {
            "name": "3619",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3619"
          },
          {
            "name": "20080204 Multiple vulnerabilities in SAPlpd 6.28",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded"
          },
          {
            "name": "ADV-2008-0438",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0438"
          },
          {
            "name": "28811",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28811"
          },
          {
            "name": "27613",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/27613"
          },
          {
            "name": "5079",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/5079"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-02-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-15T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "28786",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28786"
        },
        {
          "name": "20080205 Re: Multiple vulnerabilities in SAPlpd 6.28",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded"
        },
        {
          "name": "ADV-2008-0409",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0409"
        },
        {
          "name": "1019300",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019300"
        },
        {
          "name": "3619",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3619"
        },
        {
          "name": "20080204 Multiple vulnerabilities in SAPlpd 6.28",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded"
        },
        {
          "name": "ADV-2008-0438",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0438"
        },
        {
          "name": "28811",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28811"
        },
        {
          "name": "27613",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/27613"
        },
        {
          "name": "5079",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/5079"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-0621",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "28786",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28786"
            },
            {
              "name": "20080205 Re: Multiple vulnerabilities in SAPlpd 6.28",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded"
            },
            {
              "name": "ADV-2008-0409",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0409"
            },
            {
              "name": "1019300",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019300"
            },
            {
              "name": "3619",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3619"
            },
            {
              "name": "20080204 Multiple vulnerabilities in SAPlpd 6.28",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded"
            },
            {
              "name": "ADV-2008-0438",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0438"
            },
            {
              "name": "28811",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28811"
            },
            {
              "name": "27613",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/27613"
            },
            {
              "name": "5079",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/5079"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-0621",
    "datePublished": "2008-02-06T11:00:00",
    "dateReserved": "2008-02-05T00:00:00",
    "dateUpdated": "2024-08-07T07:54:23.070Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2002-1579 (GCVE-0-2002-1579)
Vulnerability from cvelistv5
Published
2004-03-16 05:00
Modified
2024-08-08 03:26
Severity ?
CWE
  • n/a
Summary
SAP GUI (Sapgui) 4.6D allows remote attackers to cause a denial of service (crash) via a connection to a high-numbered port, which generates an "unknown connection data" error.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:26:29.071Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20020128 Sapgui 4.6D for Windows",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2002-01/0334.html"
          },
          {
            "name": "3972",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/3972"
          },
          {
            "name": "sapgui-invalid-connect-dos(8007)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8007"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-01-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SAP GUI (Sapgui) 4.6D allows remote attackers to cause a denial of service (crash) via a connection to a high-numbered port, which generates an \"unknown connection data\" error."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20020128 Sapgui 4.6D for Windows",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2002-01/0334.html"
        },
        {
          "name": "3972",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/3972"
        },
        {
          "name": "sapgui-invalid-connect-dos(8007)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8007"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-1579",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SAP GUI (Sapgui) 4.6D allows remote attackers to cause a denial of service (crash) via a connection to a high-numbered port, which generates an \"unknown connection data\" error."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20020128 Sapgui 4.6D for Windows",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2002-01/0334.html"
            },
            {
              "name": "3972",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/3972"
            },
            {
              "name": "sapgui-invalid-connect-dos(8007)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8007"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-1579",
    "datePublished": "2004-03-16T05:00:00",
    "dateReserved": "2004-03-16T00:00:00",
    "dateUpdated": "2024-08-08T03:26:29.071Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-4475 (GCVE-0-2007-4475)
Vulnerability from cvelistv5
Published
2009-04-01 18:00
Modified
2024-08-07 14:53
Severity ?
CWE
  • n/a
Summary
Stack-based buffer overflow in EAI WebViewer3D ActiveX control (webviewer3d.dll) in SAP AG SAPgui before 7.10 Patch Level 9 allows remote attackers to execute arbitrary code via a long argument to the SaveViewToSessionFile method.
References
http://www.securityfocus.com/bid/34310vdb-entry, x_refsource_BID
http://www.vupen.com/english/advisories/2009/0892vdb-entry, x_refsource_VUPEN
http://www.kb.cert.org/vuls/id/985449third-party-advisory, x_refsource_CERT-VN
https://exchange.xforce.ibmcloud.com/vulnerabilities/49543vdb-entry, x_refsource_XF
https://service.sap.com/sap/support/notes/1153794x_refsource_MISC
http://secunia.com/advisories/34559third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:53:56.071Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "34310",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34310"
          },
          {
            "name": "ADV-2009-0892",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/0892"
          },
          {
            "name": "VU#985449",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/985449"
          },
          {
            "name": "sapgui-eaiwebviewer3D-webviewer3d-activex-bo(49543)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49543"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://service.sap.com/sap/support/notes/1153794"
          },
          {
            "name": "34559",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34559"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-03-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in EAI WebViewer3D ActiveX control (webviewer3d.dll) in SAP AG SAPgui before 7.10 Patch Level 9 allows remote attackers to execute arbitrary code via a long argument to the SaveViewToSessionFile method."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "name": "34310",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34310"
        },
        {
          "name": "ADV-2009-0892",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/0892"
        },
        {
          "name": "VU#985449",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/985449"
        },
        {
          "name": "sapgui-eaiwebviewer3D-webviewer3d-activex-bo(49543)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49543"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://service.sap.com/sap/support/notes/1153794"
        },
        {
          "name": "34559",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34559"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "ID": "CVE-2007-4475",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in EAI WebViewer3D ActiveX control (webviewer3d.dll) in SAP AG SAPgui before 7.10 Patch Level 9 allows remote attackers to execute arbitrary code via a long argument to the SaveViewToSessionFile method."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "34310",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34310"
            },
            {
              "name": "ADV-2009-0892",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/0892"
            },
            {
              "name": "VU#985449",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/985449"
            },
            {
              "name": "sapgui-eaiwebviewer3D-webviewer3d-activex-bo(49543)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49543"
            },
            {
              "name": "https://service.sap.com/sap/support/notes/1153794",
              "refsource": "MISC",
              "url": "https://service.sap.com/sap/support/notes/1153794"
            },
            {
              "name": "34559",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34559"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2007-4475",
    "datePublished": "2009-04-01T18:00:00",
    "dateReserved": "2007-08-22T00:00:00",
    "dateUpdated": "2024-08-07T14:53:56.071Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-0620 (GCVE-0-2008-0620)
Vulnerability from cvelistv5
Published
2008-02-06 11:00
Modified
2024-08-07 07:54
Severity ?
CWE
  • n/a
Summary
SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to cause a denial of service (crash) via a 0x53 LPD command, which causes the server to terminate.
References
http://secunia.com/advisories/28786third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/487575/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2008/0409vdb-entry, x_refsource_VUPEN
http://www.securitytracker.com/id?1019300vdb-entry, x_refsource_SECTRACK
http://securityreason.com/securityalert/3619third-party-advisory, x_refsource_SREASON
http://www.securityfocus.com/archive/1/487508/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://www.vupen.com/english/advisories/2008/0438vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/28811third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/27613vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:54:22.588Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "28786",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28786"
          },
          {
            "name": "20080205 Re: Multiple vulnerabilities in SAPlpd 6.28",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded"
          },
          {
            "name": "ADV-2008-0409",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0409"
          },
          {
            "name": "1019300",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019300"
          },
          {
            "name": "3619",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3619"
          },
          {
            "name": "20080204 Multiple vulnerabilities in SAPlpd 6.28",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded"
          },
          {
            "name": "ADV-2008-0438",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0438"
          },
          {
            "name": "28811",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28811"
          },
          {
            "name": "27613",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/27613"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-02-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to cause a denial of service (crash) via a 0x53 LPD command, which causes the server to terminate."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-15T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "28786",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28786"
        },
        {
          "name": "20080205 Re: Multiple vulnerabilities in SAPlpd 6.28",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded"
        },
        {
          "name": "ADV-2008-0409",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0409"
        },
        {
          "name": "1019300",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019300"
        },
        {
          "name": "3619",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3619"
        },
        {
          "name": "20080204 Multiple vulnerabilities in SAPlpd 6.28",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded"
        },
        {
          "name": "ADV-2008-0438",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0438"
        },
        {
          "name": "28811",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28811"
        },
        {
          "name": "27613",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/27613"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-0620",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to cause a denial of service (crash) via a 0x53 LPD command, which causes the server to terminate."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "28786",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28786"
            },
            {
              "name": "20080205 Re: Multiple vulnerabilities in SAPlpd 6.28",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded"
            },
            {
              "name": "ADV-2008-0409",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0409"
            },
            {
              "name": "1019300",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019300"
            },
            {
              "name": "3619",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3619"
            },
            {
              "name": "20080204 Multiple vulnerabilities in SAPlpd 6.28",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded"
            },
            {
              "name": "ADV-2008-0438",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0438"
            },
            {
              "name": "28811",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28811"
            },
            {
              "name": "27613",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/27613"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-0620",
    "datePublished": "2008-02-06T11:00:00",
    "dateReserved": "2008-02-05T00:00:00",
    "dateUpdated": "2024-08-07T07:54:22.588Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2003-1035 (GCVE-0-2003-1035)
Vulnerability from cvelistv5
Published
2004-03-16 05:00
Modified
2024-08-08 02:12
Severity ?
CWE
  • n/a
Summary
The default installation of SAP R/3 46C/D allows remote attackers to bypass account locking by using the RFC API instead of the SAPGUI to conduct a brute force password guessing attack, which does not lock out the account like the SAPGUI does.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T02:12:35.766Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "7007",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/7007"
          },
          {
            "name": "20030304 SAP R/3, account locking and RFC SDK",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004039.html"
          },
          {
            "name": "20061112 Old SAP exploits",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/451378/100/0/threaded"
          },
          {
            "name": "sap-sapinfo-lockout-bypass(11487)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11487"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2003-03-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The default installation of SAP R/3 46C/D allows remote attackers to bypass account locking by using the RFC API instead of the SAPGUI to conduct a brute force password guessing attack, which does not lock out the account like the SAPGUI does."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "7007",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/7007"
        },
        {
          "name": "20030304 SAP R/3, account locking and RFC SDK",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004039.html"
        },
        {
          "name": "20061112 Old SAP exploits",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/451378/100/0/threaded"
        },
        {
          "name": "sap-sapinfo-lockout-bypass(11487)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11487"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2003-1035",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The default installation of SAP R/3 46C/D allows remote attackers to bypass account locking by using the RFC API instead of the SAPGUI to conduct a brute force password guessing attack, which does not lock out the account like the SAPGUI does."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "7007",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/7007"
            },
            {
              "name": "20030304 SAP R/3, account locking and RFC SDK",
              "refsource": "FULLDISC",
              "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004039.html"
            },
            {
              "name": "20061112 Old SAP exploits",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/451378/100/0/threaded"
            },
            {
              "name": "sap-sapinfo-lockout-bypass(11487)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11487"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2003-1035",
    "datePublished": "2004-03-16T05:00:00",
    "dateReserved": "2004-03-15T00:00:00",
    "dateUpdated": "2024-08-08T02:12:35.766Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-4387 (GCVE-0-2008-4387)
Vulnerability from cvelistv5
Published
2008-11-10 16:00
Modified
2024-08-07 10:17
Severity ?
CWE
  • n/a
Summary
Unspecified vulnerability in the Simba MDrmSap ActiveX control in mdrmsap.dll in SAP SAPgui allows remote attackers to execute arbitrary code via unknown vectors involving instantiation by Internet Explorer.
References
http://osvdb.org/49721vdb-entry, x_refsource_OSVDB
http://www.securityfocus.com/bid/32186vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/46440vdb-entry, x_refsource_XF
http://www.vupen.com/english/advisories/2008/3106vdb-entry, x_refsource_VUPEN
http://www.kb.cert.org/vuls/id/277313third-party-advisory, x_refsource_CERT-VN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T10:17:09.307Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "49721",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/49721"
          },
          {
            "name": "32186",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/32186"
          },
          {
            "name": "sap-mdrmsap-code-execution(46440)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46440"
          },
          {
            "name": "ADV-2008-3106",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/3106"
          },
          {
            "name": "VU#277313",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/277313"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-11-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the Simba MDrmSap ActiveX control in mdrmsap.dll in SAP SAPgui allows remote attackers to execute arbitrary code via unknown vectors involving instantiation by Internet Explorer."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "name": "49721",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/49721"
        },
        {
          "name": "32186",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/32186"
        },
        {
          "name": "sap-mdrmsap-code-execution(46440)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46440"
        },
        {
          "name": "ADV-2008-3106",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/3106"
        },
        {
          "name": "VU#277313",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/277313"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "ID": "CVE-2008-4387",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the Simba MDrmSap ActiveX control in mdrmsap.dll in SAP SAPgui allows remote attackers to execute arbitrary code via unknown vectors involving instantiation by Internet Explorer."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "49721",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/49721"
            },
            {
              "name": "32186",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/32186"
            },
            {
              "name": "sap-mdrmsap-code-execution(46440)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46440"
            },
            {
              "name": "ADV-2008-3106",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/3106"
            },
            {
              "name": "VU#277313",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/277313"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2008-4387",
    "datePublished": "2008-11-10T16:00:00",
    "dateReserved": "2008-10-02T00:00:00",
    "dateUpdated": "2024-08-07T10:17:09.307Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

var-200811-0201
Vulnerability from variot

Unspecified vulnerability in the Simba MDrmSap ActiveX control in mdrmsap.dll in SAP SAPgui allows remote attackers to execute arbitrary code via unknown vectors involving instantiation by Internet Explorer. SAP AG SAPgui is prone to a remote code-execution vulnerability. Failed exploit attempts will result in a denial-of-service condition. ----------------------------------------------------------------------

Do you need accurate and reliable IDS / IPS / AV detection rules?

Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/


TITLE: SAP GUI MDrmSap ActiveX Control Code Execution Vulnerability

SECUNIA ADVISORY ID: SA32682

VERIFY ADVISORY: http://secunia.com/advisories/32682/

CRITICAL: Highly critical

IMPACT: System access

WHERE:

From remote

SOFTWARE: SAP GUI 6.x http://secunia.com/advisories/product/3337/ SAP GUI 7.x http://secunia.com/advisories/product/16959/

DESCRIPTION: A vulnerability has been reported in SAPgui, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to an unspecified error in the bundled MDrmSap ActiveX control (mdrmsap.dll). This can be exploited to compromise a user's system by e.g. tricking the user into visiting a malicious website.

SOLUTION: The vendor has reportedly issued a patch via SAP Note 1142431. http://service.sap.com/sap/support/notes/1142431

PROVIDED AND/OR DISCOVERED BY: Will Dormann, CERT/CC.

ORIGINAL ADVISORY: US-CERT VU#277313: http://www.kb.cert.org/vuls/id/277313


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200811-0201",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "mdrmsap activex control",
        "scope": null,
        "trust": 1.4,
        "vendor": "simba",
        "version": null
      },
      {
        "model": "mdrmsap activex control",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "simba",
        "version": "*"
      },
      {
        "model": "sapgui",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sap",
        "version": "*"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sap",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "simba",
        "version": null
      },
      {
        "model": "sapgui",
        "scope": null,
        "trust": 0.8,
        "vendor": "sap",
        "version": null
      },
      {
        "model": "ag sapgui",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sap",
        "version": "0"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#277313"
      },
      {
        "db": "BID",
        "id": "32186"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-006268"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200811-145"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-4387"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:sap:sapgui",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:simba_technologies:mdrmsap_activex_control",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-006268"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Will Dormann",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200811-145"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2008-4387",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2008-4387",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2008-4387",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#277313",
            "trust": 0.8,
            "value": "10.94"
          },
          {
            "author": "NVD",
            "id": "CVE-2008-4387",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200811-145",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULMON",
            "id": "CVE-2008-4387",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#277313"
      },
      {
        "db": "VULMON",
        "id": "CVE-2008-4387"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-006268"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200811-145"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-4387"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unspecified vulnerability in the Simba MDrmSap ActiveX control in mdrmsap.dll in SAP SAPgui allows remote attackers to execute arbitrary code via unknown vectors involving instantiation by Internet Explorer. SAP AG SAPgui is prone to a remote code-execution vulnerability. Failed exploit attempts will result in a denial-of-service condition. ----------------------------------------------------------------------\n\nDo you need accurate and reliable IDS / IPS / AV detection rules?\n\nGet in-depth vulnerability details:\nhttp://secunia.com/binary_analysis/sample_analysis/\n\n----------------------------------------------------------------------\n\nTITLE:\nSAP GUI MDrmSap ActiveX Control Code Execution Vulnerability\n\nSECUNIA ADVISORY ID:\nSA32682\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/32682/\n\nCRITICAL:\nHighly critical\n\nIMPACT:\nSystem access\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nSAP GUI 6.x\nhttp://secunia.com/advisories/product/3337/\nSAP GUI 7.x\nhttp://secunia.com/advisories/product/16959/\n\nDESCRIPTION:\nA vulnerability has been reported in SAPgui, which can be exploited\nby malicious people to compromise a user\u0027s system. \n\nThe vulnerability is caused due to an unspecified error in the\nbundled MDrmSap ActiveX control (mdrmsap.dll). This can be exploited\nto compromise a user\u0027s system by e.g. tricking the user into visiting\na malicious website. \n\nSOLUTION:\nThe vendor has reportedly issued a patch via SAP Note 1142431. \nhttp://service.sap.com/sap/support/notes/1142431\n\nPROVIDED AND/OR DISCOVERED BY:\nWill Dormann, CERT/CC. \n\nORIGINAL ADVISORY:\nUS-CERT VU#277313:\nhttp://www.kb.cert.org/vuls/id/277313\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2008-4387"
      },
      {
        "db": "CERT/CC",
        "id": "VU#277313"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-006268"
      },
      {
        "db": "BID",
        "id": "32186"
      },
      {
        "db": "VULMON",
        "id": "CVE-2008-4387"
      },
      {
        "db": "PACKETSTORM",
        "id": "71847"
      }
    ],
    "trust": 2.79
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#277313",
        "trust": 3.7
      },
      {
        "db": "NVD",
        "id": "CVE-2008-4387",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "32186",
        "trust": 2.0
      },
      {
        "db": "OSVDB",
        "id": "49721",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2008-3106",
        "trust": 1.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-006268",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "46440",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200811-145",
        "trust": 0.6
      },
      {
        "db": "SECUNIA",
        "id": "32682",
        "trust": 0.2
      },
      {
        "db": "VUPEN",
        "id": "2008/3106",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2008-4387",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "71847",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#277313"
      },
      {
        "db": "VULMON",
        "id": "CVE-2008-4387"
      },
      {
        "db": "BID",
        "id": "32186"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-006268"
      },
      {
        "db": "PACKETSTORM",
        "id": "71847"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200811-145"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-4387"
      }
    ]
  },
  "id": "VAR-200811-0201",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.35
  },
  "last_update_date": "2024-11-23T21:56:44.438000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SAPgui",
        "trust": 0.8,
        "url": "http://sapdocs.info/sap/other/download-sap-gui-7-20/"
      },
      {
        "title": "MDrmSap ActiveX",
        "trust": 0.8,
        "url": "http://zomobo.net/Simba_Technologies"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-006268"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-94",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-006268"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-4387"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.0,
        "url": "http://www.kb.cert.org/vuls/id/277313"
      },
      {
        "trust": 1.8,
        "url": "http://www.securityfocus.com/bid/32186"
      },
      {
        "trust": 1.7,
        "url": "http://osvdb.org/49721"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2008/3106"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46440"
      },
      {
        "trust": 0.9,
        "url": "http://service.sap.com/sap/support/notes/1142431"
      },
      {
        "trust": 0.8,
        "url": "http://support.microsoft.com/kb/240797"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4387"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-4387"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/46440"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2008/3106"
      },
      {
        "trust": 0.3,
        "url": "http://www.sap.com"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/94.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/32682/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/binary_analysis/sample_analysis/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/product/16959/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/product/3337/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#277313"
      },
      {
        "db": "VULMON",
        "id": "CVE-2008-4387"
      },
      {
        "db": "BID",
        "id": "32186"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-006268"
      },
      {
        "db": "PACKETSTORM",
        "id": "71847"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200811-145"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-4387"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#277313"
      },
      {
        "db": "VULMON",
        "id": "CVE-2008-4387"
      },
      {
        "db": "BID",
        "id": "32186"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-006268"
      },
      {
        "db": "PACKETSTORM",
        "id": "71847"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200811-145"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-4387"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2008-11-07T00:00:00",
        "db": "CERT/CC",
        "id": "VU#277313"
      },
      {
        "date": "2008-11-10T00:00:00",
        "db": "VULMON",
        "id": "CVE-2008-4387"
      },
      {
        "date": "2008-11-07T00:00:00",
        "db": "BID",
        "id": "32186"
      },
      {
        "date": "2012-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2008-006268"
      },
      {
        "date": "2008-11-12T22:55:13",
        "db": "PACKETSTORM",
        "id": "71847"
      },
      {
        "date": "2008-11-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200811-145"
      },
      {
        "date": "2008-11-10T16:15:04.907000",
        "db": "NVD",
        "id": "CVE-2008-4387"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2009-04-13T00:00:00",
        "db": "CERT/CC",
        "id": "VU#277313"
      },
      {
        "date": "2017-08-08T00:00:00",
        "db": "VULMON",
        "id": "CVE-2008-4387"
      },
      {
        "date": "2008-11-11T01:34:00",
        "db": "BID",
        "id": "32186"
      },
      {
        "date": "2012-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2008-006268"
      },
      {
        "date": "2008-11-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200811-145"
      },
      {
        "date": "2024-11-21T00:51:33.673000",
        "db": "NVD",
        "id": "CVE-2008-4387"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200811-145"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SAP AG SAPgui \u0027mdrmsap.dll\u0027 ActiveX Control Remote Code Execution Vulnerability",
    "sources": [
      {
        "db": "BID",
        "id": "32186"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200811-145"
      }
    ],
    "trust": 0.9
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "code injection",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200811-145"
      }
    ],
    "trust": 0.6
  }
}

var-200802-0422
Vulnerability from variot

SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to cause a denial of service (crash) via a 0x53 LPD command, which causes the server to terminate. SAPlpd and SAPSprint are prone to multiple remote vulnerabilities. Very little information is currently available. We will update this BID as more information emerges. This may facilitate the complete compromise of affected computers. The following versions are affected: - SAPlpd as included with SAP GUI 7.10 (and earlier) - Versions prior to SAPSprint 1018 This issue is reportedly documented in SAP Note 1138934.

PROVIDED AND/OR DISCOVERED BY: Originally reported in SAPLPD by Luigi Auriemma.


A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched.

Download and test it today: https://psi.secunia.com/

Read more about this new version: https://psi.secunia.com/?page=changelog


TITLE: SAP GUI SAPLPD Multiple Vulnerabilities

SECUNIA ADVISORY ID: SA28786

VERIFY ADVISORY: http://secunia.com/advisories/28786/

CRITICAL: Moderately critical

IMPACT: DoS, System access

WHERE:

From local network

SOFTWARE: SAP GUI 7.x http://secunia.com/product/16959/

DESCRIPTION: Luigi Auriemma has discovered some vulnerabilities in SAP GUI, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system.

1) Multiple boundary errors exist in the SAPLPD server when processing LPD commands. This can be exploited to cause buffer overflows via overly long arguments passed to the LPD commands having the following codes: 0x01, 0x02, 0x03, 0x04, 0x05, 0x31, 0x32, 0x33, 0x34, and 0x35.

Successful exploitation may allow execution of arbitrary code.

2) An error in SAPLPD when processing the 0x53 LPD command code can be exploited to terminate an affected server. Other versions may also be affected.

SOLUTION: Restrict access to TCP port 515. The vendor will reportedly release a patch soon.

PROVIDED AND/OR DISCOVERED BY: Luigi Auriemma

ORIGINAL ADVISORY: http://aluigi.altervista.org/adv/saplpdz-adv.txt


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200802-0422",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "sapgui",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "sap",
        "version": "7.10"
      },
      {
        "model": "saplpd",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "sap",
        "version": "6.28"
      },
      {
        "model": "sapsprint",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sap",
        "version": "*"
      },
      {
        "model": "saplpd",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "sap",
        "version": "6.28"
      },
      {
        "model": "sapsprint",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "sap",
        "version": "1018"
      },
      {
        "model": "sapsprint",
        "scope": null,
        "trust": 0.6,
        "vendor": "sap",
        "version": null
      },
      {
        "model": "sapsprint",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sap",
        "version": "0"
      },
      {
        "model": "saplpd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sap",
        "version": "0"
      },
      {
        "model": "sapsprint",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sap",
        "version": "1018"
      },
      {
        "model": "gui for windows patch level",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sap",
        "version": "7.006"
      },
      {
        "model": "gui for windows patch level",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sap",
        "version": "6.4030"
      },
      {
        "model": "gui for windows patch level",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sap",
        "version": "6.2072"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "27613"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-005441"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200802-087"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-0620"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:sap:sapgui",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:sap:saplpd",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:sap:sapsprint",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-005441"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Luigi Auriemma\u203b aluigi@pivx.com",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200802-087"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2008-0620",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2008-0620",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2008-0620",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2008-0620",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200802-087",
            "trust": 0.6,
            "value": "CRITICAL"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-005441"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200802-087"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-0620"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to cause a denial of service (crash) via a 0x53 LPD command, which causes the server to terminate. SAPlpd and SAPSprint are prone to multiple remote vulnerabilities. Very little information is currently available. We will update this BID as more information emerges. This may facilitate the complete compromise of affected computers. \nThe following versions are affected:\n- SAPlpd as included with SAP GUI 7.10 (and earlier)\n- Versions prior to SAPSprint 1018\nThis issue is reportedly documented in SAP Note 1138934. \n\nPROVIDED AND/OR DISCOVERED BY:\nOriginally reported in SAPLPD by Luigi Auriemma. \n\n----------------------------------------------------------------------\n\nA new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI\nhas been released. The new version includes many new and advanced\nfeatures, which makes it even easier to stay patched. \n\nDownload and test it today:\nhttps://psi.secunia.com/\n\nRead more about this new version:\nhttps://psi.secunia.com/?page=changelog\n\n----------------------------------------------------------------------\n\nTITLE:\nSAP GUI SAPLPD Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA28786\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/28786/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nDoS, System access\n\nWHERE:\n\u003eFrom local network\n\nSOFTWARE:\nSAP GUI 7.x\nhttp://secunia.com/product/16959/\n\nDESCRIPTION:\nLuigi Auriemma has discovered some vulnerabilities in SAP GUI, which\ncan be exploited by malicious people to cause a DoS (Denial of\nService) or to potentially compromise a vulnerable system. \n\n1) Multiple boundary errors exist in the SAPLPD server when\nprocessing LPD commands. This can be exploited to cause buffer\noverflows via overly long arguments passed to the LPD commands having\nthe following codes: 0x01, 0x02, 0x03, 0x04, 0x05, 0x31, 0x32, 0x33,\n0x34, and 0x35. \n\nSuccessful exploitation may allow execution of arbitrary code. \n\n2) An error in SAPLPD when processing the 0x53 LPD command code can\nbe exploited to terminate an affected server. Other versions may also be affected. \n\nSOLUTION:\nRestrict access to TCP port 515. The vendor will reportedly release a\npatch soon. \n\nPROVIDED AND/OR DISCOVERED BY:\nLuigi Auriemma\n\nORIGINAL ADVISORY:\nhttp://aluigi.altervista.org/adv/saplpdz-adv.txt\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2008-0620"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-005441"
      },
      {
        "db": "BID",
        "id": "27613"
      },
      {
        "db": "PACKETSTORM",
        "id": "63373"
      },
      {
        "db": "PACKETSTORM",
        "id": "63283"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2008-0620",
        "trust": 2.7
      },
      {
        "db": "BID",
        "id": "27613",
        "trust": 1.9
      },
      {
        "db": "SECUNIA",
        "id": "28811",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "28786",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2008-0438",
        "trust": 1.6
      },
      {
        "db": "VUPEN",
        "id": "ADV-2008-0409",
        "trust": 1.6
      },
      {
        "db": "SECTRACK",
        "id": "1019300",
        "trust": 1.6
      },
      {
        "db": "SREASON",
        "id": "3619",
        "trust": 1.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-005441",
        "trust": 0.8
      },
      {
        "db": "BUGTRAQ",
        "id": "20080204 MULTIPLE VULNERABILITIES IN SAPLPD 6.28",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20080205 RE: MULTIPLE VULNERABILITIES IN SAPLPD 6.28",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200802-087",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "63373",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "63283",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "27613"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-005441"
      },
      {
        "db": "PACKETSTORM",
        "id": "63373"
      },
      {
        "db": "PACKETSTORM",
        "id": "63283"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200802-087"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-0620"
      }
    ]
  },
  "id": "VAR-200802-0422",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.25
  },
  "last_update_date": "2024-11-23T22:43:14.406000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SAP GUI",
        "trust": 0.8,
        "url": "http://sapdocs.info/sap/other/download-sap-gui-7-20/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-005441"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-005441"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-0620"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.6,
        "url": "http://www.securitytracker.com/id?1019300"
      },
      {
        "trust": 1.6,
        "url": "http://www.securityfocus.com/bid/27613"
      },
      {
        "trust": 1.6,
        "url": "http://secunia.com/advisories/28786"
      },
      {
        "trust": 1.6,
        "url": "http://securityreason.com/securityalert/3619"
      },
      {
        "trust": 1.6,
        "url": "http://secunia.com/advisories/28811"
      },
      {
        "trust": 1.0,
        "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded"
      },
      {
        "trust": 1.0,
        "url": "http://www.vupen.com/english/advisories/2008/0438"
      },
      {
        "trust": 1.0,
        "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded"
      },
      {
        "trust": 1.0,
        "url": "http://www.vupen.com/english/advisories/2008/0409"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0620"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-0620"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/487575/100/0/threaded"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/487508/100/0/threaded"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2008/0409"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2008/0438"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/487508"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/487575"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/advisories/28786/"
      },
      {
        "trust": 0.2,
        "url": "https://psi.secunia.com/?page=changelog"
      },
      {
        "trust": 0.2,
        "url": "https://psi.secunia.com/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/28811/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/17480/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/16959/"
      },
      {
        "trust": 0.1,
        "url": "http://aluigi.altervista.org/adv/saplpdz-adv.txt"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "27613"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-005441"
      },
      {
        "db": "PACKETSTORM",
        "id": "63373"
      },
      {
        "db": "PACKETSTORM",
        "id": "63283"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200802-087"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-0620"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "27613"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-005441"
      },
      {
        "db": "PACKETSTORM",
        "id": "63373"
      },
      {
        "db": "PACKETSTORM",
        "id": "63283"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200802-087"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-0620"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2008-02-04T00:00:00",
        "db": "BID",
        "id": "27613"
      },
      {
        "date": "2012-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2008-005441"
      },
      {
        "date": "2008-02-08T01:19:15",
        "db": "PACKETSTORM",
        "id": "63373"
      },
      {
        "date": "2008-02-05T23:02:25",
        "db": "PACKETSTORM",
        "id": "63283"
      },
      {
        "date": "2008-02-06T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200802-087"
      },
      {
        "date": "2008-02-06T12:00:00",
        "db": "NVD",
        "id": "CVE-2008-0620"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-07-05T22:00:00",
        "db": "BID",
        "id": "27613"
      },
      {
        "date": "2012-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2008-005441"
      },
      {
        "date": "2008-09-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200802-087"
      },
      {
        "date": "2024-11-21T00:42:31.627000",
        "db": "NVD",
        "id": "CVE-2008-0620"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200802-087"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SAP GUI and  SAPSprint include  SAPLPD Service disruption in  (DoS) Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-005441"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200802-087"
      }
    ],
    "trust": 0.6
  }
}

var-200904-0568
Vulnerability from variot

Stack-based buffer overflow in EAI WebViewer3D ActiveX control (webviewer3d.dll) in SAP AG SAPgui before 7.10 Patch Level 9 allows remote attackers to execute arbitrary code via a long argument to the SaveViewToSessionFile method. The Siemens Unigraphics Solutions Teamcenter Visualization EAI WebViewer3D ActiveX control, which comes with SAPgui, contains a stack buffer overflow. This may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. SAP AG SAPgui is prone to a remote stack-based buffer-overflow vulnerability. Failed exploit attempts will result in a denial-of-service condition. Versions prior to SAPgui 7.10 Patch Level 9 are vulnerable. ----------------------------------------------------------------------

Secunia is pleased to announce the release of the annual Secunia report for 2008.

Highlights from the 2008 report: * Vulnerability Research * Software Inspection Results * Secunia Research Highlights * Secunia Advisory Statistics

Request the full 2008 Report here: http://secunia.com/advisories/try_vi/request_2008_report/

Stay Secure,

Secunia


TITLE: SAP GUI EAI WebViewer3D ActiveX Control Buffer Overflow

SECUNIA ADVISORY ID: SA34559

VERIFY ADVISORY: http://secunia.com/advisories/34559/

DESCRIPTION: Will Dormann has discovered a vulnerability in SAP GUI, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to a boundary error in the bundled EAI WebViewer3D ActiveX control (webviewer3d.dll) when processing arguments passed to the "SaveViewToSessionFile()" method. This can be exploited to cause a stack-based buffer overflow via an overly long argument.

The vulnerability is confirmed in versions 6.40 LP29 and 7.10 PL5. Other versions may also be affected.

SOLUTION: Update to version 7.10 PL9 or later.

PROVIDED AND/OR DISCOVERED BY: Will Dormann, CERT/CC.

ORIGINAL ADVISORY: US-CERT VU#985449: http://www.kb.cert.org/vuls/id/985449

SAP Note 1153794: https://service.sap.com/sap/support/notes/1153794


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200904-0568",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "sapgui",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sap",
        "version": "4.6d"
      },
      {
        "model": "sapgui",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sap",
        "version": "4.6c"
      },
      {
        "model": "sapgui",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sap",
        "version": "4.6b"
      },
      {
        "model": "sapgui",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sap",
        "version": "4.6a"
      },
      {
        "model": "sapgui",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sap",
        "version": "4.6"
      },
      {
        "model": "sapgui",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sap",
        "version": "6.40"
      },
      {
        "model": "sapgui",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sap",
        "version": "*"
      },
      {
        "model": "sapgui",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "sap",
        "version": "7.10"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sap",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "siemens cert",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "unigraphics",
        "version": null
      },
      {
        "model": "gui",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "sap",
        "version": "7.10 patch level 9"
      },
      {
        "model": "sapgui",
        "scope": null,
        "trust": 0.6,
        "vendor": "sap",
        "version": null
      },
      {
        "model": "ag sapgui patch level",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sap",
        "version": "7.108"
      },
      {
        "model": "ag sapgui patch level",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sap",
        "version": "7.109"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#985449"
      },
      {
        "db": "BID",
        "id": "34310"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001517"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200904-017"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-4475"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:sap:gui",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001517"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Will Dormann",
    "sources": [
      {
        "db": "BID",
        "id": "34310"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200904-017"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2007-4475",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2007-4475",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2007-4475",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#985449",
            "trust": 0.8,
            "value": "10.48"
          },
          {
            "author": "NVD",
            "id": "CVE-2007-4475",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200904-017",
            "trust": 0.6,
            "value": "CRITICAL"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#985449"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001517"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200904-017"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-4475"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Stack-based buffer overflow in EAI WebViewer3D ActiveX control (webviewer3d.dll) in SAP AG SAPgui before 7.10 Patch Level 9 allows remote attackers to execute arbitrary code via a long argument to the SaveViewToSessionFile method. The Siemens Unigraphics Solutions Teamcenter Visualization EAI WebViewer3D ActiveX control, which comes with SAPgui, contains a stack buffer overflow. This may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. SAP AG SAPgui is prone to a remote stack-based buffer-overflow vulnerability. Failed exploit attempts will result in a denial-of-service condition. \nVersions prior to SAPgui 7.10 Patch Level 9 are vulnerable. ----------------------------------------------------------------------\n\nSecunia is pleased to announce the release of the annual Secunia\nreport for 2008. \n\nHighlights from the 2008 report:\n * Vulnerability Research\n * Software Inspection Results\n * Secunia Research Highlights\n * Secunia Advisory Statistics\n\nRequest the full 2008 Report here:\nhttp://secunia.com/advisories/try_vi/request_2008_report/\n\nStay Secure,\n\nSecunia\n\n\n----------------------------------------------------------------------\n\nTITLE:\nSAP GUI EAI WebViewer3D ActiveX Control Buffer Overflow\n\nSECUNIA ADVISORY ID:\nSA34559\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/34559/\n\nDESCRIPTION:\nWill Dormann has discovered a vulnerability in SAP GUI, which can be\nexploited by malicious people to compromise a user\u0027s system. \n\nThe vulnerability is caused due to a boundary error in the bundled\nEAI WebViewer3D ActiveX control (webviewer3d.dll) when processing\narguments passed to the \"SaveViewToSessionFile()\" method. This can be\nexploited to cause a stack-based buffer overflow via an overly long\nargument. \n\nThe vulnerability is confirmed in versions 6.40 LP29 and 7.10 PL5. \nOther versions may also be affected. \n\nSOLUTION:\nUpdate to version 7.10 PL9 or later. \n\nPROVIDED AND/OR DISCOVERED BY:\nWill Dormann, CERT/CC. \n\nORIGINAL ADVISORY:\nUS-CERT VU#985449:\nhttp://www.kb.cert.org/vuls/id/985449\n\nSAP Note 1153794:\nhttps://service.sap.com/sap/support/notes/1153794\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2007-4475"
      },
      {
        "db": "CERT/CC",
        "id": "VU#985449"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001517"
      },
      {
        "db": "BID",
        "id": "34310"
      },
      {
        "db": "PACKETSTORM",
        "id": "76252"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#985449",
        "trust": 2.8
      },
      {
        "db": "NVD",
        "id": "CVE-2007-4475",
        "trust": 2.7
      },
      {
        "db": "BID",
        "id": "34310",
        "trust": 1.9
      },
      {
        "db": "SECUNIA",
        "id": "34559",
        "trust": 1.8
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-0892",
        "trust": 1.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001517",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "3",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "49543",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200904-017",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "76252",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#985449"
      },
      {
        "db": "BID",
        "id": "34310"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001517"
      },
      {
        "db": "PACKETSTORM",
        "id": "76252"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200904-017"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-4475"
      }
    ]
  },
  "id": "VAR-200904-0568",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.212367725
  },
  "last_update_date": "2024-11-23T20:27:59.615000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.sap.com/index.epx"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001517"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001517"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-4475"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.8,
        "url": "https://service.sap.com/sap/support/notes/1153794"
      },
      {
        "trust": 2.0,
        "url": "http://www.kb.cert.org/vuls/id/985449"
      },
      {
        "trust": 1.6,
        "url": "http://www.vupen.com/english/advisories/2009/0892"
      },
      {
        "trust": 1.6,
        "url": "http://www.securityfocus.com/bid/34310"
      },
      {
        "trust": 1.6,
        "url": "http://secunia.com/advisories/34559"
      },
      {
        "trust": 1.1,
        "url": "http://support.microsoft.com/kb/240797"
      },
      {
        "trust": 1.0,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49543"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4475"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-4475"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/49543"
      },
      {
        "trust": 0.3,
        "url": "http://www.sap.com"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/506743"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/34559/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/try_vi/request_2008_report/"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#985449"
      },
      {
        "db": "BID",
        "id": "34310"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001517"
      },
      {
        "db": "PACKETSTORM",
        "id": "76252"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200904-017"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-4475"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#985449"
      },
      {
        "db": "BID",
        "id": "34310"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-001517"
      },
      {
        "db": "PACKETSTORM",
        "id": "76252"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200904-017"
      },
      {
        "db": "NVD",
        "id": "CVE-2007-4475"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2009-03-31T00:00:00",
        "db": "CERT/CC",
        "id": "VU#985449"
      },
      {
        "date": "2009-03-31T00:00:00",
        "db": "BID",
        "id": "34310"
      },
      {
        "date": "2009-06-30T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-001517"
      },
      {
        "date": "2009-04-01T14:13:17",
        "db": "PACKETSTORM",
        "id": "76252"
      },
      {
        "date": "2009-03-31T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200904-017"
      },
      {
        "date": "2009-04-01T18:30:00.547000",
        "db": "NVD",
        "id": "CVE-2007-4475"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2009-04-13T00:00:00",
        "db": "CERT/CC",
        "id": "VU#985449"
      },
      {
        "date": "2010-03-09T06:02:00",
        "db": "BID",
        "id": "34310"
      },
      {
        "date": "2009-06-30T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-001517"
      },
      {
        "date": "2009-04-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200904-017"
      },
      {
        "date": "2024-11-21T00:35:41.107000",
        "db": "NVD",
        "id": "CVE-2007-4475"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200904-017"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SAP AG SAPgui EAI WebViewer3D ActiveX control stack buffer overflow",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#985449"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200904-017"
      }
    ],
    "trust": 0.6
  }
}

var-200802-0423
Vulnerability from variot

Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands. SAPlpd and SAPSprint are prone to multiple remote vulnerabilities. Very little information is currently available. We will update this BID as more information emerges. Successfully exploiting these issues allows remote attackers to crash the service and potentially to execute arbitrary code. This may facilitate the complete compromise of affected computers. The following versions are affected: - SAPlpd as included with SAP GUI 7.10 (and earlier) - Versions prior to SAPSprint 1018 This issue is reportedly documented in SAP Note 1138934.

PROVIDED AND/OR DISCOVERED BY: Originally reported in SAPLPD by Luigi Auriemma.


A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched.

Download and test it today: https://psi.secunia.com/

Read more about this new version: https://psi.secunia.com/?page=changelog


TITLE: SAP GUI SAPLPD Multiple Vulnerabilities

SECUNIA ADVISORY ID: SA28786

VERIFY ADVISORY: http://secunia.com/advisories/28786/

CRITICAL: Moderately critical

IMPACT: DoS, System access

WHERE:

From local network

SOFTWARE: SAP GUI 7.x http://secunia.com/product/16959/

DESCRIPTION: Luigi Auriemma has discovered some vulnerabilities in SAP GUI, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system.

1) Multiple boundary errors exist in the SAPLPD server when processing LPD commands.

Successful exploitation may allow execution of arbitrary code.

2) An error in SAPLPD when processing the 0x53 LPD command code can be exploited to terminate an affected server. Other versions may also be affected.

SOLUTION: Restrict access to TCP port 515. The vendor will reportedly release a patch soon.

PROVIDED AND/OR DISCOVERED BY: Luigi Auriemma

ORIGINAL ADVISORY: http://aluigi.altervista.org/adv/saplpdz-adv.txt


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200802-0423",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "sapgui",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "sap",
        "version": "7.10"
      },
      {
        "model": "saplpd",
        "scope": "lte",
        "trust": 1.8,
        "vendor": "sap",
        "version": "6.28"
      },
      {
        "model": "sapsprint",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sap",
        "version": "*"
      },
      {
        "model": "saplpd",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "sap",
        "version": "6.28"
      },
      {
        "model": "sapsprint",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "sap",
        "version": "1018"
      },
      {
        "model": "sapsprint",
        "scope": null,
        "trust": 0.6,
        "vendor": "sap",
        "version": null
      },
      {
        "model": "sapsprint",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sap",
        "version": "0"
      },
      {
        "model": "saplpd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sap",
        "version": "0"
      },
      {
        "model": "sapsprint",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sap",
        "version": "1018"
      },
      {
        "model": "gui for windows patch level",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sap",
        "version": "7.006"
      },
      {
        "model": "gui for windows patch level",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sap",
        "version": "6.4030"
      },
      {
        "model": "gui for windows patch level",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sap",
        "version": "6.2072"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "27613"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-005442"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200802-088"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-0621"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:sap:sapgui",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:sap:saplpd",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:sap:sapsprint",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-005442"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Luigi Auriemma  aluigi@pivx.com",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200802-088"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2008-0621",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2008-0621",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2008-0621",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2008-0621",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200802-088",
            "trust": 0.6,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-005442"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200802-088"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-0621"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands. SAPlpd and SAPSprint are prone to multiple remote vulnerabilities. Very little information is currently available. We will update this BID as more information emerges. \nSuccessfully exploiting these issues allows remote attackers to crash the service and potentially to execute arbitrary code. This may facilitate the complete compromise of affected computers. \nThe following versions are affected:\n- SAPlpd as included with SAP GUI 7.10 (and earlier)\n- Versions prior to SAPSprint 1018\nThis issue is reportedly documented in SAP Note 1138934. \n\nPROVIDED AND/OR DISCOVERED BY:\nOriginally reported in SAPLPD by Luigi Auriemma. \n\n----------------------------------------------------------------------\n\nA new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI\nhas been released. The new version includes many new and advanced\nfeatures, which makes it even easier to stay patched. \n\nDownload and test it today:\nhttps://psi.secunia.com/\n\nRead more about this new version:\nhttps://psi.secunia.com/?page=changelog\n\n----------------------------------------------------------------------\n\nTITLE:\nSAP GUI SAPLPD Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA28786\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/28786/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nDoS, System access\n\nWHERE:\n\u003eFrom local network\n\nSOFTWARE:\nSAP GUI 7.x\nhttp://secunia.com/product/16959/\n\nDESCRIPTION:\nLuigi Auriemma has discovered some vulnerabilities in SAP GUI, which\ncan be exploited by malicious people to cause a DoS (Denial of\nService) or to potentially compromise a vulnerable system. \n\n1) Multiple boundary errors exist in the SAPLPD server when\nprocessing LPD commands. \n\nSuccessful exploitation may allow execution of arbitrary code. \n\n2) An error in SAPLPD when processing the 0x53 LPD command code can\nbe exploited to terminate an affected server. Other versions may also be affected. \n\nSOLUTION:\nRestrict access to TCP port 515. The vendor will reportedly release a\npatch soon. \n\nPROVIDED AND/OR DISCOVERED BY:\nLuigi Auriemma\n\nORIGINAL ADVISORY:\nhttp://aluigi.altervista.org/adv/saplpdz-adv.txt\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2008-0621"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-005442"
      },
      {
        "db": "BID",
        "id": "27613"
      },
      {
        "db": "PACKETSTORM",
        "id": "63373"
      },
      {
        "db": "PACKETSTORM",
        "id": "63283"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2008-0621",
        "trust": 2.7
      },
      {
        "db": "BID",
        "id": "27613",
        "trust": 1.9
      },
      {
        "db": "SECUNIA",
        "id": "28811",
        "trust": 1.7
      },
      {
        "db": "SECUNIA",
        "id": "28786",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2008-0438",
        "trust": 1.6
      },
      {
        "db": "VUPEN",
        "id": "ADV-2008-0409",
        "trust": 1.6
      },
      {
        "db": "SECTRACK",
        "id": "1019300",
        "trust": 1.6
      },
      {
        "db": "EXPLOIT-DB",
        "id": "5079",
        "trust": 1.6
      },
      {
        "db": "SREASON",
        "id": "3619",
        "trust": 1.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-005442",
        "trust": 0.8
      },
      {
        "db": "MILW0RM",
        "id": "5079",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20080204 MULTIPLE VULNERABILITIES IN SAPLPD 6.28",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20080205 RE: MULTIPLE VULNERABILITIES IN SAPLPD 6.28",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200802-088",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "63373",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "63283",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "27613"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-005442"
      },
      {
        "db": "PACKETSTORM",
        "id": "63373"
      },
      {
        "db": "PACKETSTORM",
        "id": "63283"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200802-088"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-0621"
      }
    ]
  },
  "id": "VAR-200802-0423",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.25
  },
  "last_update_date": "2024-11-23T22:43:14.445000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SAP GUI",
        "trust": 0.8,
        "url": "http://sapdocs.info/sap/other/download-sap-gui-7-20/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-005442"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-005442"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-0621"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.6,
        "url": "http://www.securitytracker.com/id?1019300"
      },
      {
        "trust": 1.6,
        "url": "http://www.securityfocus.com/bid/27613"
      },
      {
        "trust": 1.6,
        "url": "http://secunia.com/advisories/28786"
      },
      {
        "trust": 1.6,
        "url": "http://securityreason.com/securityalert/3619"
      },
      {
        "trust": 1.6,
        "url": "http://secunia.com/advisories/28811"
      },
      {
        "trust": 1.0,
        "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded"
      },
      {
        "trust": 1.0,
        "url": "http://www.vupen.com/english/advisories/2008/0438"
      },
      {
        "trust": 1.0,
        "url": "https://www.exploit-db.com/exploits/5079"
      },
      {
        "trust": 1.0,
        "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded"
      },
      {
        "trust": 1.0,
        "url": "http://www.vupen.com/english/advisories/2008/0409"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0621"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-0621"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/487575/100/0/threaded"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/487508/100/0/threaded"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2008/0409"
      },
      {
        "trust": 0.6,
        "url": "http://www.milw0rm.com/exploits/5079"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2008/0438"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/487508"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/487575"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/advisories/28786/"
      },
      {
        "trust": 0.2,
        "url": "https://psi.secunia.com/?page=changelog"
      },
      {
        "trust": 0.2,
        "url": "https://psi.secunia.com/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/28811/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/17480/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/16959/"
      },
      {
        "trust": 0.1,
        "url": "http://aluigi.altervista.org/adv/saplpdz-adv.txt"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "27613"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-005442"
      },
      {
        "db": "PACKETSTORM",
        "id": "63373"
      },
      {
        "db": "PACKETSTORM",
        "id": "63283"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200802-088"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-0621"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "27613"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-005442"
      },
      {
        "db": "PACKETSTORM",
        "id": "63373"
      },
      {
        "db": "PACKETSTORM",
        "id": "63283"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200802-088"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-0621"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2008-02-04T00:00:00",
        "db": "BID",
        "id": "27613"
      },
      {
        "date": "2012-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2008-005442"
      },
      {
        "date": "2008-02-08T01:19:15",
        "db": "PACKETSTORM",
        "id": "63373"
      },
      {
        "date": "2008-02-05T23:02:25",
        "db": "PACKETSTORM",
        "id": "63283"
      },
      {
        "date": "2008-02-06T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200802-088"
      },
      {
        "date": "2008-02-06T12:00:00",
        "db": "NVD",
        "id": "CVE-2008-0621"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2016-07-05T22:00:00",
        "db": "BID",
        "id": "27613"
      },
      {
        "date": "2012-12-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2008-005442"
      },
      {
        "date": "2008-09-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200802-088"
      },
      {
        "date": "2024-11-21T00:42:31.793000",
        "db": "NVD",
        "id": "CVE-2008-0621"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200802-088"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SAP GUI and  SAPSprint include  SAPLPD Vulnerable to buffer overflow",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-005442"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200802-088"
      }
    ],
    "trust": 0.6
  }
}

Vulnerability from fkie_nvd
Published
2004-04-15 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
The default installation of SAP R/3 46C/D allows remote attackers to bypass account locking by using the RFC API instead of the SAPGUI to conduct a brute force password guessing attack, which does not lock out the account like the SAPGUI does.
Impacted products
Vendor Product Version
sap sap_r_3 *
sap sapgui 4.6c
sap sapgui 4.6d



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sap:sap_r_3:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "812BDEE8-05CD-40A7-9BF0-263C5AE9024F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:sapgui:4.6c:*:windows:*:*:*:*:*",
              "matchCriteriaId": "33C7A581-C3CF-468F-8B06-1C9F227D5967",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:sapgui:4.6d:*:windows:*:*:*:*:*",
              "matchCriteriaId": "4FCC8060-E285-43BA-9626-D9CB960A964D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The default installation of SAP R/3 46C/D allows remote attackers to bypass account locking by using the RFC API instead of the SAPGUI to conduct a brute force password guessing attack, which does not lock out the account like the SAPGUI does."
    },
    {
      "lang": "es",
      "value": "La instalaci\u00f3n por defecto de SAP R/3 46C/D permite a atacantes remotos saltarse bloqueos de cuentas usando la API RFC en lugar de SAPGUI para hacer ataques de fuerza bruta para averiguar la contrase\u00f1a, lo cual no bloquea las cuentas como lo hace SAPGUI."
    }
  ],
  "id": "CVE-2003-1035",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-04-15T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004039.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/451378/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/7007"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11487"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004039.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/451378/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/7007"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11487"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-02-06 12:00
Modified
2025-04-09 00:30
Severity ?
Summary
Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands.
Impacted products
Vendor Product Version
sap sapgui 7.10
sap saplpd *
sap sapsprint *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sap:sapgui:7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCEAAEEF-62DE-4BDD-846A-EA746FC4AADC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:saplpd:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F9C73A3-56A4-41C3-895A-4D49608B2946",
              "versionEndIncluding": "6.28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:sapsprint:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADF65E3D-45F1-4491-8532-B5BE4F6CD2E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en SAPLPD 6.28 y anteriores incluidas en SAP GUI 7.10 y SAPSprint antes de 1018. Permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de argumentos largos a los comandos 1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04 y (5) 0x05 LPD."
    }
  ],
  "id": "CVE-2008-0621",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-02-06T12:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28786"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28811"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/3619"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/27613"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1019300"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/0409"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/0438"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/5079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28786"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28811"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/3619"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/27613"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1019300"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0409"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0438"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/5079"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-02-06 12:00
Modified
2025-04-09 00:30
Severity ?
Summary
SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to cause a denial of service (crash) via a 0x53 LPD command, which causes the server to terminate.
Impacted products
Vendor Product Version
sap sapgui 7.10
sap saplpd *
sap sapsprint *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sap:sapgui:7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCEAAEEF-62DE-4BDD-846A-EA746FC4AADC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:saplpd:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F9C73A3-56A4-41C3-895A-4D49608B2946",
              "versionEndIncluding": "6.28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:sapsprint:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADF65E3D-45F1-4491-8532-B5BE4F6CD2E4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to cause a denial of service (crash) via a 0x53 LPD command, which causes the server to terminate."
    },
    {
      "lang": "es",
      "value": "SAPLPD 6.28 y anteriores incluidas en SAP GUI 7.10 y SAPSprint antes de 1018. permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de un comando 0x53 LPD, lo que provoca que el servidor termine."
    }
  ],
  "id": "CVE-2008-0620",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-02-06T12:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28786"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28811"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/3619"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/27613"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1019300"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/0409"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/0438"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/28786"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28811"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/3619"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/27613"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1019300"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0409"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0438"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-11-10 16:15
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in the Simba MDrmSap ActiveX control in mdrmsap.dll in SAP SAPgui allows remote attackers to execute arbitrary code via unknown vectors involving instantiation by Internet Explorer.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sap:sapgui:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B5B9DE5-0BD7-48C8-B09C-1F1E1AB58F69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:simba_technologies:mdrmsap_activex_control:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9956870B-8039-46E9-9839-ECD464D08CE8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8682FAF3-98E3-485C-89CB-C0358C4E2AB0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the Simba MDrmSap ActiveX control in mdrmsap.dll in SAP SAPgui allows remote attackers to execute arbitrary code via unknown vectors involving instantiation by Internet Explorer."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en el control ActiveX  MDrmSap de Simba en mdrmsap.dll en SAP SAPgui permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante vectores desconocidos que involucran la instanciaci\u00f3n por Internet Explorer."
    }
  ],
  "evaluatorSolution": "Patch Information (SAP Login Required) = http://service.sap.com/sap/support/notes/1142431",
  "id": "CVE-2008-4387",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-11-10T16:15:04.907",
  "references": [
    {
      "source": "cret@cert.org",
      "url": "http://osvdb.org/49721"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/277313"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.securityfocus.com/bid/32186"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vupen.com/english/advisories/2008/3106"
    },
    {
      "source": "cret@cert.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46440"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/49721"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/277313"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/32186"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/3106"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46440"
    }
  ],
  "sourceIdentifier": "cret@cert.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2004-04-15 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
SAP GUI (Sapgui) 4.6D allows remote attackers to cause a denial of service (crash) via a connection to a high-numbered port, which generates an "unknown connection data" error.
Impacted products
Vendor Product Version
sap sapgui 4.6
sap sapgui 4.6a
sap sapgui 4.6b
sap sapgui 4.6c
sap sapgui 4.6d



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sap:sapgui:4.6:*:windows:*:*:*:*:*",
              "matchCriteriaId": "E63EC32D-4655-4B26-9E1A-8E33257050F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:sapgui:4.6a:*:windows:*:*:*:*:*",
              "matchCriteriaId": "D26797AD-F444-4918-AE21-11E9546C9FF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:sapgui:4.6b:*:windows:*:*:*:*:*",
              "matchCriteriaId": "8E59FDE0-8BF8-4BF3-AE4F-E7F810216A12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:sapgui:4.6c:*:windows:*:*:*:*:*",
              "matchCriteriaId": "33C7A581-C3CF-468F-8B06-1C9F227D5967",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:sapgui:4.6d:*:windows:*:*:*:*:*",
              "matchCriteriaId": "4FCC8060-E285-43BA-9626-D9CB960A964D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SAP GUI (Sapgui) 4.6D allows remote attackers to cause a denial of service (crash) via a connection to a high-numbered port, which generates an \"unknown connection data\" error."
    },
    {
      "lang": "es",
      "value": "SAP GUI (Sapgui) 4.6D permite a atacantes remotos causar una denegaci\u00f3n de servicio mediante una conexi\u00f3n a un puerto con un n\u00famero alto, que genera un un error \"conexi\u00f3n de datos desconocida\"."
    }
  ],
  "id": "CVE-2002-1579",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-04-15T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2002-01/0334.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/3972"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8007"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2002-01/0334.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/3972"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8007"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-04-01 18:30
Modified
2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in EAI WebViewer3D ActiveX control (webviewer3d.dll) in SAP AG SAPgui before 7.10 Patch Level 9 allows remote attackers to execute arbitrary code via a long argument to the SaveViewToSessionFile method.
Impacted products
Vendor Product Version
sap sapgui *
sap sapgui *
sap sapgui 4.6
sap sapgui 4.6
sap sapgui 4.6a
sap sapgui 4.6a
sap sapgui 4.6b
sap sapgui 4.6b
sap sapgui 4.6c
sap sapgui 4.6c
sap sapgui 4.6d
sap sapgui 4.6d
sap sapgui 6.40



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sap:sapgui:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B5B9DE5-0BD7-48C8-B09C-1F1E1AB58F69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:sapgui:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B6AAD82-9A2F-41E1-87B3-69C501D5884C",
              "versionEndIncluding": "7.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:sapgui:4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E38F14B4-7A3D-4F54-9C8F-C1C43676AC2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:sapgui:4.6:*:windows:*:*:*:*:*",
              "matchCriteriaId": "E63EC32D-4655-4B26-9E1A-8E33257050F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:sapgui:4.6a:*:*:*:*:*:*:*",
              "matchCriteriaId": "852B75EA-0C2F-4549-A412-EA283EF18120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:sapgui:4.6a:*:windows:*:*:*:*:*",
              "matchCriteriaId": "D26797AD-F444-4918-AE21-11E9546C9FF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:sapgui:4.6b:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9A7356A-E8B4-4550-A30B-FE7C0B3BE65D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:sapgui:4.6b:*:windows:*:*:*:*:*",
              "matchCriteriaId": "8E59FDE0-8BF8-4BF3-AE4F-E7F810216A12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:sapgui:4.6c:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB4E3BF3-7460-46AA-AABF-CA46360EF83F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:sapgui:4.6c:*:windows:*:*:*:*:*",
              "matchCriteriaId": "33C7A581-C3CF-468F-8B06-1C9F227D5967",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:sapgui:4.6d:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE53A838-0367-4D67-9CB2-DDAF275FE7B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:sapgui:4.6d:*:windows:*:*:*:*:*",
              "matchCriteriaId": "4FCC8060-E285-43BA-9626-D9CB960A964D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:sapgui:6.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC699787-C1C8-4EF4-8587-617FC9CCED14",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in EAI WebViewer3D ActiveX control (webviewer3d.dll) in SAP AG SAPgui before 7.10 Patch Level 9 allows remote attackers to execute arbitrary code via a long argument to the SaveViewToSessionFile method."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en el control ActiveX de EAI WebViewer3D (webviewer3d.dll) en SAP AG SAPgui versiones anteriores a v7.10 Patch Level 9 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un argumento largo del m\u00e9todo SaveViewToSessionFile."
    }
  ],
  "id": "CVE-2007-4475",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2009-04-01T18:30:00.547",
  "references": [
    {
      "source": "cret@cert.org",
      "url": "http://secunia.com/advisories/34559"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Patch",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/985449"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.securityfocus.com/bid/34310"
    },
    {
      "source": "cret@cert.org",
      "url": "http://www.vupen.com/english/advisories/2009/0892"
    },
    {
      "source": "cret@cert.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49543"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://service.sap.com/sap/support/notes/1153794"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/34559"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/985449"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/34310"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2009/0892"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49543"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://service.sap.com/sap/support/notes/1153794"
    }
  ],
  "sourceIdentifier": "cret@cert.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}