Vulnerabilites related to sap - sapgui
CVE-2008-0621 (GCVE-0-2008-0621)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/28786 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/archive/1/487575/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.vupen.com/english/advisories/2008/0409 | vdb-entry, x_refsource_VUPEN | |
http://www.securitytracker.com/id?1019300 | vdb-entry, x_refsource_SECTRACK | |
http://securityreason.com/securityalert/3619 | third-party-advisory, x_refsource_SREASON | |
http://www.securityfocus.com/archive/1/487508/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.vupen.com/english/advisories/2008/0438 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/28811 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/27613 | vdb-entry, x_refsource_BID | |
https://www.exploit-db.com/exploits/5079 | exploit, x_refsource_EXPLOIT-DB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:54:23.070Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "28786", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28786" }, { "name": "20080205 Re: Multiple vulnerabilities in SAPlpd 6.28", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded" }, { "name": "ADV-2008-0409", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0409" }, { "name": "1019300", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019300" }, { "name": "3619", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3619" }, { "name": "20080204 Multiple vulnerabilities in SAPlpd 6.28", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded" }, { "name": "ADV-2008-0438", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0438" }, { "name": "28811", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28811" }, { "name": "27613", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27613" }, { "name": "5079", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/5079" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-02-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "28786", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28786" }, { "name": "20080205 Re: Multiple vulnerabilities in SAPlpd 6.28", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded" }, { "name": "ADV-2008-0409", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0409" }, { "name": "1019300", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019300" }, { "name": "3619", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3619" }, { "name": "20080204 Multiple vulnerabilities in SAPlpd 6.28", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded" }, { "name": "ADV-2008-0438", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0438" }, { "name": "28811", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28811" }, { "name": "27613", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27613" }, { "name": "5079", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/5079" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0621", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "28786", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28786" }, { "name": "20080205 Re: Multiple vulnerabilities in SAPlpd 6.28", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded" }, { "name": "ADV-2008-0409", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0409" }, { "name": "1019300", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019300" }, { "name": "3619", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3619" }, { "name": "20080204 Multiple vulnerabilities in SAPlpd 6.28", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded" }, { "name": "ADV-2008-0438", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0438" }, { "name": "28811", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28811" }, { "name": "27613", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27613" }, { "name": "5079", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/5079" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-0621", "datePublished": "2008-02-06T11:00:00", "dateReserved": "2008-02-05T00:00:00", "dateUpdated": "2024-08-07T07:54:23.070Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2002-1579 (GCVE-0-2002-1579)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2002-01/0334.html | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/3972 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/8007 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:26:29.071Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20020128 Sapgui 4.6D for Windows", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-01/0334.html" }, { "name": "3972", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/3972" }, { "name": "sapgui-invalid-connect-dos(8007)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8007" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-01-28T00:00:00", "descriptions": [ { "lang": "en", "value": "SAP GUI (Sapgui) 4.6D allows remote attackers to cause a denial of service (crash) via a connection to a high-numbered port, which generates an \"unknown connection data\" error." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20020128 Sapgui 4.6D for Windows", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-01/0334.html" }, { "name": "3972", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/3972" }, { "name": "sapgui-invalid-connect-dos(8007)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8007" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1579", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SAP GUI (Sapgui) 4.6D allows remote attackers to cause a denial of service (crash) via a connection to a high-numbered port, which generates an \"unknown connection data\" error." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20020128 Sapgui 4.6D for Windows", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2002-01/0334.html" }, { "name": "3972", "refsource": "BID", "url": "http://www.securityfocus.com/bid/3972" }, { "name": "sapgui-invalid-connect-dos(8007)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8007" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1579", "datePublished": "2004-03-16T05:00:00", "dateReserved": "2004-03-16T00:00:00", "dateUpdated": "2024-08-08T03:26:29.071Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-4475 (GCVE-0-2007-4475)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/34310 | vdb-entry, x_refsource_BID | |
http://www.vupen.com/english/advisories/2009/0892 | vdb-entry, x_refsource_VUPEN | |
http://www.kb.cert.org/vuls/id/985449 | third-party-advisory, x_refsource_CERT-VN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/49543 | vdb-entry, x_refsource_XF | |
https://service.sap.com/sap/support/notes/1153794 | x_refsource_MISC | |
http://secunia.com/advisories/34559 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:53:56.071Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "34310", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34310" }, { "name": "ADV-2009-0892", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0892" }, { "name": "VU#985449", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/985449" }, { "name": "sapgui-eaiwebviewer3D-webviewer3d-activex-bo(49543)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49543" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://service.sap.com/sap/support/notes/1153794" }, { "name": "34559", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34559" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-03-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in EAI WebViewer3D ActiveX control (webviewer3d.dll) in SAP AG SAPgui before 7.10 Patch Level 9 allows remote attackers to execute arbitrary code via a long argument to the SaveViewToSessionFile method." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "34310", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34310" }, { "name": "ADV-2009-0892", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0892" }, { "name": "VU#985449", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/985449" }, { "name": "sapgui-eaiwebviewer3D-webviewer3d-activex-bo(49543)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49543" }, { "tags": [ "x_refsource_MISC" ], "url": "https://service.sap.com/sap/support/notes/1153794" }, { "name": "34559", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34559" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2007-4475", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in EAI WebViewer3D ActiveX control (webviewer3d.dll) in SAP AG SAPgui before 7.10 Patch Level 9 allows remote attackers to execute arbitrary code via a long argument to the SaveViewToSessionFile method." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "34310", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34310" }, { "name": "ADV-2009-0892", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0892" }, { "name": "VU#985449", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/985449" }, { "name": "sapgui-eaiwebviewer3D-webviewer3d-activex-bo(49543)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49543" }, { "name": "https://service.sap.com/sap/support/notes/1153794", "refsource": "MISC", "url": "https://service.sap.com/sap/support/notes/1153794" }, { "name": "34559", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34559" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2007-4475", "datePublished": "2009-04-01T18:00:00", "dateReserved": "2007-08-22T00:00:00", "dateUpdated": "2024-08-07T14:53:56.071Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-0620 (GCVE-0-2008-0620)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/28786 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/archive/1/487575/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.vupen.com/english/advisories/2008/0409 | vdb-entry, x_refsource_VUPEN | |
http://www.securitytracker.com/id?1019300 | vdb-entry, x_refsource_SECTRACK | |
http://securityreason.com/securityalert/3619 | third-party-advisory, x_refsource_SREASON | |
http://www.securityfocus.com/archive/1/487508/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.vupen.com/english/advisories/2008/0438 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/28811 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/27613 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:54:22.588Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "28786", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28786" }, { "name": "20080205 Re: Multiple vulnerabilities in SAPlpd 6.28", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded" }, { "name": "ADV-2008-0409", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0409" }, { "name": "1019300", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019300" }, { "name": "3619", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3619" }, { "name": "20080204 Multiple vulnerabilities in SAPlpd 6.28", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded" }, { "name": "ADV-2008-0438", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0438" }, { "name": "28811", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28811" }, { "name": "27613", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27613" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-02-04T00:00:00", "descriptions": [ { "lang": "en", "value": "SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to cause a denial of service (crash) via a 0x53 LPD command, which causes the server to terminate." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "28786", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28786" }, { "name": "20080205 Re: Multiple vulnerabilities in SAPlpd 6.28", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded" }, { "name": "ADV-2008-0409", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0409" }, { "name": "1019300", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019300" }, { "name": "3619", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3619" }, { "name": "20080204 Multiple vulnerabilities in SAPlpd 6.28", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded" }, { "name": "ADV-2008-0438", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0438" }, { "name": "28811", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28811" }, { "name": "27613", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27613" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0620", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to cause a denial of service (crash) via a 0x53 LPD command, which causes the server to terminate." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "28786", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28786" }, { "name": "20080205 Re: Multiple vulnerabilities in SAPlpd 6.28", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded" }, { "name": "ADV-2008-0409", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0409" }, { "name": "1019300", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019300" }, { "name": "3619", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3619" }, { "name": "20080204 Multiple vulnerabilities in SAPlpd 6.28", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded" }, { "name": "ADV-2008-0438", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0438" }, { "name": "28811", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28811" }, { "name": "27613", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27613" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-0620", "datePublished": "2008-02-06T11:00:00", "dateReserved": "2008-02-05T00:00:00", "dateUpdated": "2024-08-07T07:54:22.588Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2003-1035 (GCVE-0-2003-1035)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/7007 | vdb-entry, x_refsource_BID | |
http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004039.html | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/archive/1/451378/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/11487 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:12:35.766Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "7007", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/7007" }, { "name": "20030304 SAP R/3, account locking and RFC SDK", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004039.html" }, { "name": "20061112 Old SAP exploits", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/451378/100/0/threaded" }, { "name": "sap-sapinfo-lockout-bypass(11487)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11487" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-03-04T00:00:00", "descriptions": [ { "lang": "en", "value": "The default installation of SAP R/3 46C/D allows remote attackers to bypass account locking by using the RFC API instead of the SAPGUI to conduct a brute force password guessing attack, which does not lock out the account like the SAPGUI does." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-19T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "7007", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/7007" }, { "name": "20030304 SAP R/3, account locking and RFC SDK", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004039.html" }, { "name": "20061112 Old SAP exploits", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/451378/100/0/threaded" }, { "name": "sap-sapinfo-lockout-bypass(11487)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11487" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1035", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The default installation of SAP R/3 46C/D allows remote attackers to bypass account locking by using the RFC API instead of the SAPGUI to conduct a brute force password guessing attack, which does not lock out the account like the SAPGUI does." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "7007", "refsource": "BID", "url": "http://www.securityfocus.com/bid/7007" }, { "name": "20030304 SAP R/3, account locking and RFC SDK", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004039.html" }, { "name": "20061112 Old SAP exploits", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/451378/100/0/threaded" }, { "name": "sap-sapinfo-lockout-bypass(11487)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11487" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1035", "datePublished": "2004-03-16T05:00:00", "dateReserved": "2004-03-15T00:00:00", "dateUpdated": "2024-08-08T02:12:35.766Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-4387 (GCVE-0-2008-4387)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://osvdb.org/49721 | vdb-entry, x_refsource_OSVDB | |
http://www.securityfocus.com/bid/32186 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/46440 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2008/3106 | vdb-entry, x_refsource_VUPEN | |
http://www.kb.cert.org/vuls/id/277313 | third-party-advisory, x_refsource_CERT-VN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:17:09.307Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "49721", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/49721" }, { "name": "32186", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/32186" }, { "name": "sap-mdrmsap-code-execution(46440)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46440" }, { "name": "ADV-2008-3106", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/3106" }, { "name": "VU#277313", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/277313" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-11-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the Simba MDrmSap ActiveX control in mdrmsap.dll in SAP SAPgui allows remote attackers to execute arbitrary code via unknown vectors involving instantiation by Internet Explorer." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "49721", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/49721" }, { "name": "32186", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/32186" }, { "name": "sap-mdrmsap-code-execution(46440)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46440" }, { "name": "ADV-2008-3106", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/3106" }, { "name": "VU#277313", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/277313" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2008-4387", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the Simba MDrmSap ActiveX control in mdrmsap.dll in SAP SAPgui allows remote attackers to execute arbitrary code via unknown vectors involving instantiation by Internet Explorer." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "49721", "refsource": "OSVDB", "url": "http://osvdb.org/49721" }, { "name": "32186", "refsource": "BID", "url": "http://www.securityfocus.com/bid/32186" }, { "name": "sap-mdrmsap-code-execution(46440)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46440" }, { "name": "ADV-2008-3106", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/3106" }, { "name": "VU#277313", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/277313" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2008-4387", "datePublished": "2008-11-10T16:00:00", "dateReserved": "2008-10-02T00:00:00", "dateUpdated": "2024-08-07T10:17:09.307Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-200811-0201
Vulnerability from variot
Unspecified vulnerability in the Simba MDrmSap ActiveX control in mdrmsap.dll in SAP SAPgui allows remote attackers to execute arbitrary code via unknown vectors involving instantiation by Internet Explorer. SAP AG SAPgui is prone to a remote code-execution vulnerability. Failed exploit attempts will result in a denial-of-service condition. ----------------------------------------------------------------------
Do you need accurate and reliable IDS / IPS / AV detection rules?
Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/
TITLE: SAP GUI MDrmSap ActiveX Control Code Execution Vulnerability
SECUNIA ADVISORY ID: SA32682
VERIFY ADVISORY: http://secunia.com/advisories/32682/
CRITICAL: Highly critical
IMPACT: System access
WHERE:
From remote
SOFTWARE: SAP GUI 6.x http://secunia.com/advisories/product/3337/ SAP GUI 7.x http://secunia.com/advisories/product/16959/
DESCRIPTION: A vulnerability has been reported in SAPgui, which can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to an unspecified error in the bundled MDrmSap ActiveX control (mdrmsap.dll). This can be exploited to compromise a user's system by e.g. tricking the user into visiting a malicious website.
SOLUTION: The vendor has reportedly issued a patch via SAP Note 1142431. http://service.sap.com/sap/support/notes/1142431
PROVIDED AND/OR DISCOVERED BY: Will Dormann, CERT/CC.
ORIGINAL ADVISORY: US-CERT VU#277313: http://www.kb.cert.org/vuls/id/277313
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200811-0201", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "mdrmsap activex control", "scope": null, "trust": 1.4, "vendor": "simba", "version": null }, { "model": "mdrmsap activex control", "scope": "eq", "trust": 1.0, "vendor": "simba", "version": "*" }, { "model": "sapgui", "scope": "eq", "trust": 1.0, "vendor": "sap", "version": "*" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sap", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "simba", "version": null }, { "model": "sapgui", "scope": null, "trust": 0.8, "vendor": "sap", "version": null }, { "model": "ag sapgui", "scope": "eq", "trust": 0.3, "vendor": "sap", "version": "0" } ], "sources": [ { "db": "CERT/CC", "id": "VU#277313" }, { "db": "BID", "id": "32186" }, { "db": "JVNDB", "id": "JVNDB-2008-006268" }, { "db": "CNNVD", "id": "CNNVD-200811-145" }, { "db": "NVD", "id": "CVE-2008-4387" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:sap:sapgui", "vulnerable": true }, { "cpe22Uri": "cpe:/a:simba_technologies:mdrmsap_activex_control", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-006268" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Will Dormann", "sources": [ { "db": "CNNVD", "id": "CNNVD-200811-145" } ], "trust": 0.6 }, "cve": "CVE-2008-4387", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2008-4387", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2008-4387", "trust": 1.0, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#277313", "trust": 0.8, "value": "10.94" }, { "author": "NVD", "id": "CVE-2008-4387", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200811-145", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULMON", "id": "CVE-2008-4387", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#277313" }, { "db": "VULMON", "id": "CVE-2008-4387" }, { "db": "JVNDB", "id": "JVNDB-2008-006268" }, { "db": "CNNVD", "id": "CNNVD-200811-145" }, { "db": "NVD", "id": "CVE-2008-4387" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unspecified vulnerability in the Simba MDrmSap ActiveX control in mdrmsap.dll in SAP SAPgui allows remote attackers to execute arbitrary code via unknown vectors involving instantiation by Internet Explorer. SAP AG SAPgui is prone to a remote code-execution vulnerability. Failed exploit attempts will result in a denial-of-service condition. ----------------------------------------------------------------------\n\nDo you need accurate and reliable IDS / IPS / AV detection rules?\n\nGet in-depth vulnerability details:\nhttp://secunia.com/binary_analysis/sample_analysis/\n\n----------------------------------------------------------------------\n\nTITLE:\nSAP GUI MDrmSap ActiveX Control Code Execution Vulnerability\n\nSECUNIA ADVISORY ID:\nSA32682\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/32682/\n\nCRITICAL:\nHighly critical\n\nIMPACT:\nSystem access\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nSAP GUI 6.x\nhttp://secunia.com/advisories/product/3337/\nSAP GUI 7.x\nhttp://secunia.com/advisories/product/16959/\n\nDESCRIPTION:\nA vulnerability has been reported in SAPgui, which can be exploited\nby malicious people to compromise a user\u0027s system. \n\nThe vulnerability is caused due to an unspecified error in the\nbundled MDrmSap ActiveX control (mdrmsap.dll). This can be exploited\nto compromise a user\u0027s system by e.g. tricking the user into visiting\na malicious website. \n\nSOLUTION:\nThe vendor has reportedly issued a patch via SAP Note 1142431. \nhttp://service.sap.com/sap/support/notes/1142431\n\nPROVIDED AND/OR DISCOVERED BY:\nWill Dormann, CERT/CC. \n\nORIGINAL ADVISORY:\nUS-CERT VU#277313:\nhttp://www.kb.cert.org/vuls/id/277313\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2008-4387" }, { "db": "CERT/CC", "id": "VU#277313" }, { "db": "JVNDB", "id": "JVNDB-2008-006268" }, { "db": "BID", "id": "32186" }, { "db": "VULMON", "id": "CVE-2008-4387" }, { "db": "PACKETSTORM", "id": "71847" } ], "trust": 2.79 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#277313", "trust": 3.7 }, { "db": "NVD", "id": "CVE-2008-4387", "trust": 2.8 }, { "db": "BID", "id": "32186", "trust": 2.0 }, { "db": "OSVDB", "id": "49721", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2008-3106", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2008-006268", "trust": 0.8 }, { "db": "XF", "id": "46440", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200811-145", "trust": 0.6 }, { "db": "SECUNIA", "id": "32682", "trust": 0.2 }, { "db": "VUPEN", "id": "2008/3106", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2008-4387", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "71847", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#277313" }, { "db": "VULMON", "id": "CVE-2008-4387" }, { "db": "BID", "id": "32186" }, { "db": "JVNDB", "id": "JVNDB-2008-006268" }, { "db": "PACKETSTORM", "id": "71847" }, { "db": "CNNVD", "id": "CNNVD-200811-145" }, { "db": "NVD", "id": "CVE-2008-4387" } ] }, "id": "VAR-200811-0201", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.35 }, "last_update_date": "2024-11-23T21:56:44.438000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SAPgui", "trust": 0.8, "url": "http://sapdocs.info/sap/other/download-sap-gui-7-20/" }, { "title": "MDrmSap ActiveX", "trust": 0.8, "url": "http://zomobo.net/Simba_Technologies" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-006268" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-94", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-006268" }, { "db": "NVD", "id": "CVE-2008-4387" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "http://www.kb.cert.org/vuls/id/277313" }, { "trust": 1.8, "url": "http://www.securityfocus.com/bid/32186" }, { "trust": 1.7, "url": "http://osvdb.org/49721" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2008/3106" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46440" }, { "trust": 0.9, "url": "http://service.sap.com/sap/support/notes/1142431" }, { "trust": 0.8, "url": "http://support.microsoft.com/kb/240797" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4387" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-4387" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/46440" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/3106" }, { "trust": 0.3, "url": "http://www.sap.com" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/94.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "http://secunia.com/advisories/32682/" }, { "trust": 0.1, "url": "http://secunia.com/binary_analysis/sample_analysis/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/product/16959/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/advisories/product/3337/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#277313" }, { "db": "VULMON", "id": "CVE-2008-4387" }, { "db": "BID", "id": "32186" }, { "db": "JVNDB", "id": "JVNDB-2008-006268" }, { "db": "PACKETSTORM", "id": "71847" }, { "db": "CNNVD", "id": "CNNVD-200811-145" }, { "db": "NVD", "id": "CVE-2008-4387" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#277313" }, { "db": "VULMON", "id": "CVE-2008-4387" }, { "db": "BID", "id": "32186" }, { "db": "JVNDB", "id": "JVNDB-2008-006268" }, { "db": "PACKETSTORM", "id": "71847" }, { "db": "CNNVD", "id": "CNNVD-200811-145" }, { "db": "NVD", "id": "CVE-2008-4387" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-11-07T00:00:00", "db": "CERT/CC", "id": "VU#277313" }, { "date": "2008-11-10T00:00:00", "db": "VULMON", "id": "CVE-2008-4387" }, { "date": "2008-11-07T00:00:00", "db": "BID", "id": "32186" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-006268" }, { "date": "2008-11-12T22:55:13", "db": "PACKETSTORM", "id": "71847" }, { "date": "2008-11-10T00:00:00", "db": "CNNVD", "id": "CNNVD-200811-145" }, { "date": "2008-11-10T16:15:04.907000", "db": "NVD", "id": "CVE-2008-4387" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2009-04-13T00:00:00", "db": "CERT/CC", "id": "VU#277313" }, { "date": "2017-08-08T00:00:00", "db": "VULMON", "id": "CVE-2008-4387" }, { "date": "2008-11-11T01:34:00", "db": "BID", "id": "32186" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-006268" }, { "date": "2008-11-15T00:00:00", "db": "CNNVD", "id": "CNNVD-200811-145" }, { "date": "2024-11-21T00:51:33.673000", "db": "NVD", "id": "CVE-2008-4387" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200811-145" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SAP AG SAPgui \u0027mdrmsap.dll\u0027 ActiveX Control Remote Code Execution Vulnerability", "sources": [ { "db": "BID", "id": "32186" }, { "db": "CNNVD", "id": "CNNVD-200811-145" } ], "trust": 0.9 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-200811-145" } ], "trust": 0.6 } }
var-200802-0422
Vulnerability from variot
SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to cause a denial of service (crash) via a 0x53 LPD command, which causes the server to terminate. SAPlpd and SAPSprint are prone to multiple remote vulnerabilities. Very little information is currently available. We will update this BID as more information emerges. This may facilitate the complete compromise of affected computers. The following versions are affected: - SAPlpd as included with SAP GUI 7.10 (and earlier) - Versions prior to SAPSprint 1018 This issue is reportedly documented in SAP Note 1138934.
PROVIDED AND/OR DISCOVERED BY: Originally reported in SAPLPD by Luigi Auriemma.
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched.
Download and test it today: https://psi.secunia.com/
Read more about this new version: https://psi.secunia.com/?page=changelog
TITLE: SAP GUI SAPLPD Multiple Vulnerabilities
SECUNIA ADVISORY ID: SA28786
VERIFY ADVISORY: http://secunia.com/advisories/28786/
CRITICAL: Moderately critical
IMPACT: DoS, System access
WHERE:
From local network
SOFTWARE: SAP GUI 7.x http://secunia.com/product/16959/
DESCRIPTION: Luigi Auriemma has discovered some vulnerabilities in SAP GUI, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system.
1) Multiple boundary errors exist in the SAPLPD server when processing LPD commands. This can be exploited to cause buffer overflows via overly long arguments passed to the LPD commands having the following codes: 0x01, 0x02, 0x03, 0x04, 0x05, 0x31, 0x32, 0x33, 0x34, and 0x35.
Successful exploitation may allow execution of arbitrary code.
2) An error in SAPLPD when processing the 0x53 LPD command code can be exploited to terminate an affected server. Other versions may also be affected.
SOLUTION: Restrict access to TCP port 515. The vendor will reportedly release a patch soon.
PROVIDED AND/OR DISCOVERED BY: Luigi Auriemma
ORIGINAL ADVISORY: http://aluigi.altervista.org/adv/saplpdz-adv.txt
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200802-0422", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sapgui", "scope": "eq", "trust": 2.4, "vendor": "sap", "version": "7.10" }, { "model": "saplpd", "scope": "lte", "trust": 1.8, "vendor": "sap", "version": "6.28" }, { "model": "sapsprint", "scope": "eq", "trust": 1.0, "vendor": "sap", "version": "*" }, { "model": "saplpd", "scope": "eq", "trust": 0.9, "vendor": "sap", "version": "6.28" }, { "model": "sapsprint", "scope": "lt", "trust": 0.8, "vendor": "sap", "version": "1018" }, { "model": "sapsprint", "scope": null, "trust": 0.6, "vendor": "sap", "version": null }, { "model": "sapsprint", "scope": "eq", "trust": 0.3, "vendor": "sap", "version": "0" }, { "model": "saplpd", "scope": "eq", "trust": 0.3, "vendor": "sap", "version": "0" }, { "model": "sapsprint", "scope": "ne", "trust": 0.3, "vendor": "sap", "version": "1018" }, { "model": "gui for windows patch level", "scope": "ne", "trust": 0.3, "vendor": "sap", "version": "7.006" }, { "model": "gui for windows patch level", "scope": "ne", "trust": 0.3, "vendor": "sap", "version": "6.4030" }, { "model": "gui for windows patch level", "scope": "ne", "trust": 0.3, "vendor": "sap", "version": "6.2072" } ], "sources": [ { "db": "BID", "id": "27613" }, { "db": "JVNDB", "id": "JVNDB-2008-005441" }, { "db": "CNNVD", "id": "CNNVD-200802-087" }, { "db": "NVD", "id": "CVE-2008-0620" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:sap:sapgui", "vulnerable": true }, { "cpe22Uri": "cpe:/a:sap:saplpd", "vulnerable": true }, { "cpe22Uri": "cpe:/a:sap:sapsprint", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-005441" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Luigi Auriemma\u203b aluigi@pivx.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200802-087" } ], "trust": 0.6 }, "cve": "CVE-2008-0620", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2008-0620", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2008-0620", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2008-0620", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200802-087", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-005441" }, { "db": "CNNVD", "id": "CNNVD-200802-087" }, { "db": "NVD", "id": "CVE-2008-0620" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to cause a denial of service (crash) via a 0x53 LPD command, which causes the server to terminate. SAPlpd and SAPSprint are prone to multiple remote vulnerabilities. Very little information is currently available. We will update this BID as more information emerges. This may facilitate the complete compromise of affected computers. \nThe following versions are affected:\n- SAPlpd as included with SAP GUI 7.10 (and earlier)\n- Versions prior to SAPSprint 1018\nThis issue is reportedly documented in SAP Note 1138934. \n\nPROVIDED AND/OR DISCOVERED BY:\nOriginally reported in SAPLPD by Luigi Auriemma. \n\n----------------------------------------------------------------------\n\nA new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI\nhas been released. The new version includes many new and advanced\nfeatures, which makes it even easier to stay patched. \n\nDownload and test it today:\nhttps://psi.secunia.com/\n\nRead more about this new version:\nhttps://psi.secunia.com/?page=changelog\n\n----------------------------------------------------------------------\n\nTITLE:\nSAP GUI SAPLPD Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA28786\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/28786/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nDoS, System access\n\nWHERE:\n\u003eFrom local network\n\nSOFTWARE:\nSAP GUI 7.x\nhttp://secunia.com/product/16959/\n\nDESCRIPTION:\nLuigi Auriemma has discovered some vulnerabilities in SAP GUI, which\ncan be exploited by malicious people to cause a DoS (Denial of\nService) or to potentially compromise a vulnerable system. \n\n1) Multiple boundary errors exist in the SAPLPD server when\nprocessing LPD commands. This can be exploited to cause buffer\noverflows via overly long arguments passed to the LPD commands having\nthe following codes: 0x01, 0x02, 0x03, 0x04, 0x05, 0x31, 0x32, 0x33,\n0x34, and 0x35. \n\nSuccessful exploitation may allow execution of arbitrary code. \n\n2) An error in SAPLPD when processing the 0x53 LPD command code can\nbe exploited to terminate an affected server. Other versions may also be affected. \n\nSOLUTION:\nRestrict access to TCP port 515. The vendor will reportedly release a\npatch soon. \n\nPROVIDED AND/OR DISCOVERED BY:\nLuigi Auriemma\n\nORIGINAL ADVISORY:\nhttp://aluigi.altervista.org/adv/saplpdz-adv.txt\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2008-0620" }, { "db": "JVNDB", "id": "JVNDB-2008-005441" }, { "db": "BID", "id": "27613" }, { "db": "PACKETSTORM", "id": "63373" }, { "db": "PACKETSTORM", "id": "63283" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2008-0620", "trust": 2.7 }, { "db": "BID", "id": "27613", "trust": 1.9 }, { "db": "SECUNIA", "id": "28811", "trust": 1.7 }, { "db": "SECUNIA", "id": "28786", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2008-0438", "trust": 1.6 }, { "db": "VUPEN", "id": "ADV-2008-0409", "trust": 1.6 }, { "db": "SECTRACK", "id": "1019300", "trust": 1.6 }, { "db": "SREASON", "id": "3619", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2008-005441", "trust": 0.8 }, { "db": "BUGTRAQ", "id": "20080204 MULTIPLE VULNERABILITIES IN SAPLPD 6.28", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20080205 RE: MULTIPLE VULNERABILITIES IN SAPLPD 6.28", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200802-087", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "63373", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "63283", "trust": 0.1 } ], "sources": [ { "db": "BID", "id": "27613" }, { "db": "JVNDB", "id": "JVNDB-2008-005441" }, { "db": "PACKETSTORM", "id": "63373" }, { "db": "PACKETSTORM", "id": "63283" }, { "db": "CNNVD", "id": "CNNVD-200802-087" }, { "db": "NVD", "id": "CVE-2008-0620" } ] }, "id": "VAR-200802-0422", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.25 }, "last_update_date": "2024-11-23T22:43:14.406000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SAP GUI", "trust": 0.8, "url": "http://sapdocs.info/sap/other/download-sap-gui-7-20/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-005441" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-005441" }, { "db": "NVD", "id": "CVE-2008-0620" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "http://www.securitytracker.com/id?1019300" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/27613" }, { "trust": 1.6, "url": "http://secunia.com/advisories/28786" }, { "trust": 1.6, "url": "http://securityreason.com/securityalert/3619" }, { "trust": 1.6, "url": "http://secunia.com/advisories/28811" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2008/0438" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2008/0409" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0620" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-0620" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/487575/100/0/threaded" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/487508/100/0/threaded" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/0409" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/0438" }, { "trust": 0.3, "url": "/archive/1/487508" }, { "trust": 0.3, "url": "/archive/1/487575" }, { "trust": 0.2, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.2, "url": "http://secunia.com/advisories/28786/" }, { "trust": 0.2, "url": "https://psi.secunia.com/?page=changelog" }, { "trust": 0.2, "url": "https://psi.secunia.com/" }, { "trust": 0.2, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.2, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/28811/" }, { "trust": 0.1, "url": "http://secunia.com/product/17480/" }, { "trust": 0.1, "url": "http://secunia.com/product/16959/" }, { "trust": 0.1, "url": "http://aluigi.altervista.org/adv/saplpdz-adv.txt" } ], "sources": [ { "db": "BID", "id": "27613" }, { "db": "JVNDB", "id": "JVNDB-2008-005441" }, { "db": "PACKETSTORM", "id": "63373" }, { "db": "PACKETSTORM", "id": "63283" }, { "db": "CNNVD", "id": "CNNVD-200802-087" }, { "db": "NVD", "id": "CVE-2008-0620" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "27613" }, { "db": "JVNDB", "id": "JVNDB-2008-005441" }, { "db": "PACKETSTORM", "id": "63373" }, { "db": "PACKETSTORM", "id": "63283" }, { "db": "CNNVD", "id": "CNNVD-200802-087" }, { "db": "NVD", "id": "CVE-2008-0620" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-02-04T00:00:00", "db": "BID", "id": "27613" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-005441" }, { "date": "2008-02-08T01:19:15", "db": "PACKETSTORM", "id": "63373" }, { "date": "2008-02-05T23:02:25", "db": "PACKETSTORM", "id": "63283" }, { "date": "2008-02-06T00:00:00", "db": "CNNVD", "id": "CNNVD-200802-087" }, { "date": "2008-02-06T12:00:00", "db": "NVD", "id": "CVE-2008-0620" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-07-05T22:00:00", "db": "BID", "id": "27613" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-005441" }, { "date": "2008-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-200802-087" }, { "date": "2024-11-21T00:42:31.627000", "db": "NVD", "id": "CVE-2008-0620" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200802-087" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SAP GUI and SAPSprint include SAPLPD Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-005441" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-200802-087" } ], "trust": 0.6 } }
var-200904-0568
Vulnerability from variot
Stack-based buffer overflow in EAI WebViewer3D ActiveX control (webviewer3d.dll) in SAP AG SAPgui before 7.10 Patch Level 9 allows remote attackers to execute arbitrary code via a long argument to the SaveViewToSessionFile method. The Siemens Unigraphics Solutions Teamcenter Visualization EAI WebViewer3D ActiveX control, which comes with SAPgui, contains a stack buffer overflow. This may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. SAP AG SAPgui is prone to a remote stack-based buffer-overflow vulnerability. Failed exploit attempts will result in a denial-of-service condition. Versions prior to SAPgui 7.10 Patch Level 9 are vulnerable. ----------------------------------------------------------------------
Secunia is pleased to announce the release of the annual Secunia report for 2008.
Highlights from the 2008 report: * Vulnerability Research * Software Inspection Results * Secunia Research Highlights * Secunia Advisory Statistics
Request the full 2008 Report here: http://secunia.com/advisories/try_vi/request_2008_report/
Stay Secure,
Secunia
TITLE: SAP GUI EAI WebViewer3D ActiveX Control Buffer Overflow
SECUNIA ADVISORY ID: SA34559
VERIFY ADVISORY: http://secunia.com/advisories/34559/
DESCRIPTION: Will Dormann has discovered a vulnerability in SAP GUI, which can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to a boundary error in the bundled EAI WebViewer3D ActiveX control (webviewer3d.dll) when processing arguments passed to the "SaveViewToSessionFile()" method. This can be exploited to cause a stack-based buffer overflow via an overly long argument.
The vulnerability is confirmed in versions 6.40 LP29 and 7.10 PL5. Other versions may also be affected.
SOLUTION: Update to version 7.10 PL9 or later.
PROVIDED AND/OR DISCOVERED BY: Will Dormann, CERT/CC.
ORIGINAL ADVISORY: US-CERT VU#985449: http://www.kb.cert.org/vuls/id/985449
SAP Note 1153794: https://service.sap.com/sap/support/notes/1153794
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200904-0568", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sapgui", "scope": "eq", "trust": 1.6, "vendor": "sap", "version": "4.6d" }, { "model": "sapgui", "scope": "eq", "trust": 1.6, "vendor": "sap", "version": "4.6c" }, { "model": "sapgui", "scope": "eq", "trust": 1.6, "vendor": "sap", "version": "4.6b" }, { "model": "sapgui", "scope": "eq", "trust": 1.6, "vendor": "sap", "version": "4.6a" }, { "model": "sapgui", "scope": "eq", "trust": 1.6, "vendor": "sap", "version": "4.6" }, { "model": "sapgui", "scope": "eq", "trust": 1.0, "vendor": "sap", "version": "6.40" }, { "model": "sapgui", "scope": "eq", "trust": 1.0, "vendor": "sap", "version": "*" }, { "model": "sapgui", "scope": "lte", "trust": 1.0, "vendor": "sap", "version": "7.10" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sap", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "siemens cert", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "unigraphics", "version": null }, { "model": "gui", "scope": "lt", "trust": 0.8, "vendor": "sap", "version": "7.10 patch level 9" }, { "model": "sapgui", "scope": null, "trust": 0.6, "vendor": "sap", "version": null }, { "model": "ag sapgui patch level", "scope": "eq", "trust": 0.3, "vendor": "sap", "version": "7.108" }, { "model": "ag sapgui patch level", "scope": "ne", "trust": 0.3, "vendor": "sap", "version": "7.109" } ], "sources": [ { "db": "CERT/CC", "id": "VU#985449" }, { "db": "BID", "id": "34310" }, { "db": "JVNDB", "id": "JVNDB-2009-001517" }, { "db": "CNNVD", "id": "CNNVD-200904-017" }, { "db": "NVD", "id": "CVE-2007-4475" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:sap:gui", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-001517" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Will Dormann", "sources": [ { "db": "BID", "id": "34310" }, { "db": "CNNVD", "id": "CNNVD-200904-017" } ], "trust": 0.9 }, "cve": "CVE-2007-4475", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2007-4475", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2007-4475", "trust": 1.0, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#985449", "trust": 0.8, "value": "10.48" }, { "author": "NVD", "id": "CVE-2007-4475", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200904-017", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#985449" }, { "db": "JVNDB", "id": "JVNDB-2009-001517" }, { "db": "CNNVD", "id": "CNNVD-200904-017" }, { "db": "NVD", "id": "CVE-2007-4475" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Stack-based buffer overflow in EAI WebViewer3D ActiveX control (webviewer3d.dll) in SAP AG SAPgui before 7.10 Patch Level 9 allows remote attackers to execute arbitrary code via a long argument to the SaveViewToSessionFile method. The Siemens Unigraphics Solutions Teamcenter Visualization EAI WebViewer3D ActiveX control, which comes with SAPgui, contains a stack buffer overflow. This may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. SAP AG SAPgui is prone to a remote stack-based buffer-overflow vulnerability. Failed exploit attempts will result in a denial-of-service condition. \nVersions prior to SAPgui 7.10 Patch Level 9 are vulnerable. ----------------------------------------------------------------------\n\nSecunia is pleased to announce the release of the annual Secunia\nreport for 2008. \n\nHighlights from the 2008 report:\n * Vulnerability Research\n * Software Inspection Results\n * Secunia Research Highlights\n * Secunia Advisory Statistics\n\nRequest the full 2008 Report here:\nhttp://secunia.com/advisories/try_vi/request_2008_report/\n\nStay Secure,\n\nSecunia\n\n\n----------------------------------------------------------------------\n\nTITLE:\nSAP GUI EAI WebViewer3D ActiveX Control Buffer Overflow\n\nSECUNIA ADVISORY ID:\nSA34559\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/34559/\n\nDESCRIPTION:\nWill Dormann has discovered a vulnerability in SAP GUI, which can be\nexploited by malicious people to compromise a user\u0027s system. \n\nThe vulnerability is caused due to a boundary error in the bundled\nEAI WebViewer3D ActiveX control (webviewer3d.dll) when processing\narguments passed to the \"SaveViewToSessionFile()\" method. This can be\nexploited to cause a stack-based buffer overflow via an overly long\nargument. \n\nThe vulnerability is confirmed in versions 6.40 LP29 and 7.10 PL5. \nOther versions may also be affected. \n\nSOLUTION:\nUpdate to version 7.10 PL9 or later. \n\nPROVIDED AND/OR DISCOVERED BY:\nWill Dormann, CERT/CC. \n\nORIGINAL ADVISORY:\nUS-CERT VU#985449:\nhttp://www.kb.cert.org/vuls/id/985449\n\nSAP Note 1153794:\nhttps://service.sap.com/sap/support/notes/1153794\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2007-4475" }, { "db": "CERT/CC", "id": "VU#985449" }, { "db": "JVNDB", "id": "JVNDB-2009-001517" }, { "db": "BID", "id": "34310" }, { "db": "PACKETSTORM", "id": "76252" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "CERT/CC", "id": "VU#985449", "trust": 2.8 }, { "db": "NVD", "id": "CVE-2007-4475", "trust": 2.7 }, { "db": "BID", "id": "34310", "trust": 1.9 }, { "db": "SECUNIA", "id": "34559", "trust": 1.8 }, { "db": "VUPEN", "id": "ADV-2009-0892", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2009-001517", "trust": 0.8 }, { "db": "XF", "id": "3", "trust": 0.6 }, { "db": "XF", "id": "49543", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200904-017", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "76252", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#985449" }, { "db": "BID", "id": "34310" }, { "db": "JVNDB", "id": "JVNDB-2009-001517" }, { "db": "PACKETSTORM", "id": "76252" }, { "db": "CNNVD", "id": "CNNVD-200904-017" }, { "db": "NVD", "id": "CVE-2007-4475" } ] }, "id": "VAR-200904-0568", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.212367725 }, "last_update_date": "2024-11-23T20:27:59.615000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.sap.com/index.epx" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-001517" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-001517" }, { "db": "NVD", "id": "CVE-2007-4475" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "https://service.sap.com/sap/support/notes/1153794" }, { "trust": 2.0, "url": "http://www.kb.cert.org/vuls/id/985449" }, { "trust": 1.6, "url": "http://www.vupen.com/english/advisories/2009/0892" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/34310" }, { "trust": 1.6, "url": "http://secunia.com/advisories/34559" }, { "trust": 1.1, "url": "http://support.microsoft.com/kb/240797" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49543" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-4475" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-4475" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/49543" }, { "trust": 0.3, "url": "http://www.sap.com" }, { "trust": 0.3, "url": "/archive/1/506743" }, { "trust": 0.1, "url": "http://secunia.com/advisories/34559/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/advisories/try_vi/request_2008_report/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#985449" }, { "db": "BID", "id": "34310" }, { "db": "JVNDB", "id": "JVNDB-2009-001517" }, { "db": "PACKETSTORM", "id": "76252" }, { "db": "CNNVD", "id": "CNNVD-200904-017" }, { "db": "NVD", "id": "CVE-2007-4475" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#985449" }, { "db": "BID", "id": "34310" }, { "db": "JVNDB", "id": "JVNDB-2009-001517" }, { "db": "PACKETSTORM", "id": "76252" }, { "db": "CNNVD", "id": "CNNVD-200904-017" }, { "db": "NVD", "id": "CVE-2007-4475" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2009-03-31T00:00:00", "db": "CERT/CC", "id": "VU#985449" }, { "date": "2009-03-31T00:00:00", "db": "BID", "id": "34310" }, { "date": "2009-06-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2009-001517" }, { "date": "2009-04-01T14:13:17", "db": "PACKETSTORM", "id": "76252" }, { "date": "2009-03-31T00:00:00", "db": "CNNVD", "id": "CNNVD-200904-017" }, { "date": "2009-04-01T18:30:00.547000", "db": "NVD", "id": "CVE-2007-4475" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2009-04-13T00:00:00", "db": "CERT/CC", "id": "VU#985449" }, { "date": "2010-03-09T06:02:00", "db": "BID", "id": "34310" }, { "date": "2009-06-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2009-001517" }, { "date": "2009-04-08T00:00:00", "db": "CNNVD", "id": "CNNVD-200904-017" }, { "date": "2024-11-21T00:35:41.107000", "db": "NVD", "id": "CVE-2007-4475" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200904-017" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SAP AG SAPgui EAI WebViewer3D ActiveX control stack buffer overflow", "sources": [ { "db": "CERT/CC", "id": "VU#985449" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-200904-017" } ], "trust": 0.6 } }
var-200802-0423
Vulnerability from variot
Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands. SAPlpd and SAPSprint are prone to multiple remote vulnerabilities. Very little information is currently available. We will update this BID as more information emerges. Successfully exploiting these issues allows remote attackers to crash the service and potentially to execute arbitrary code. This may facilitate the complete compromise of affected computers. The following versions are affected: - SAPlpd as included with SAP GUI 7.10 (and earlier) - Versions prior to SAPSprint 1018 This issue is reportedly documented in SAP Note 1138934.
PROVIDED AND/OR DISCOVERED BY: Originally reported in SAPLPD by Luigi Auriemma.
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched.
Download and test it today: https://psi.secunia.com/
Read more about this new version: https://psi.secunia.com/?page=changelog
TITLE: SAP GUI SAPLPD Multiple Vulnerabilities
SECUNIA ADVISORY ID: SA28786
VERIFY ADVISORY: http://secunia.com/advisories/28786/
CRITICAL: Moderately critical
IMPACT: DoS, System access
WHERE:
From local network
SOFTWARE: SAP GUI 7.x http://secunia.com/product/16959/
DESCRIPTION: Luigi Auriemma has discovered some vulnerabilities in SAP GUI, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system.
1) Multiple boundary errors exist in the SAPLPD server when processing LPD commands.
Successful exploitation may allow execution of arbitrary code.
2) An error in SAPLPD when processing the 0x53 LPD command code can be exploited to terminate an affected server. Other versions may also be affected.
SOLUTION: Restrict access to TCP port 515. The vendor will reportedly release a patch soon.
PROVIDED AND/OR DISCOVERED BY: Luigi Auriemma
ORIGINAL ADVISORY: http://aluigi.altervista.org/adv/saplpdz-adv.txt
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200802-0423", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sapgui", "scope": "eq", "trust": 2.4, "vendor": "sap", "version": "7.10" }, { "model": "saplpd", "scope": "lte", "trust": 1.8, "vendor": "sap", "version": "6.28" }, { "model": "sapsprint", "scope": "eq", "trust": 1.0, "vendor": "sap", "version": "*" }, { "model": "saplpd", "scope": "eq", "trust": 0.9, "vendor": "sap", "version": "6.28" }, { "model": "sapsprint", "scope": "lt", "trust": 0.8, "vendor": "sap", "version": "1018" }, { "model": "sapsprint", "scope": null, "trust": 0.6, "vendor": "sap", "version": null }, { "model": "sapsprint", "scope": "eq", "trust": 0.3, "vendor": "sap", "version": "0" }, { "model": "saplpd", "scope": "eq", "trust": 0.3, "vendor": "sap", "version": "0" }, { "model": "sapsprint", "scope": "ne", "trust": 0.3, "vendor": "sap", "version": "1018" }, { "model": "gui for windows patch level", "scope": "ne", "trust": 0.3, "vendor": "sap", "version": "7.006" }, { "model": "gui for windows patch level", "scope": "ne", "trust": 0.3, "vendor": "sap", "version": "6.4030" }, { "model": "gui for windows patch level", "scope": "ne", "trust": 0.3, "vendor": "sap", "version": "6.2072" } ], "sources": [ { "db": "BID", "id": "27613" }, { "db": "JVNDB", "id": "JVNDB-2008-005442" }, { "db": "CNNVD", "id": "CNNVD-200802-088" }, { "db": "NVD", "id": "CVE-2008-0621" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:sap:sapgui", "vulnerable": true }, { "cpe22Uri": "cpe:/a:sap:saplpd", "vulnerable": true }, { "cpe22Uri": "cpe:/a:sap:sapsprint", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-005442" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Luigi Auriemma aluigi@pivx.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200802-088" } ], "trust": 0.6 }, "cve": "CVE-2008-0621", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2008-0621", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2008-0621", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2008-0621", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200802-088", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-005442" }, { "db": "CNNVD", "id": "CNNVD-200802-088" }, { "db": "NVD", "id": "CVE-2008-0621" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands. SAPlpd and SAPSprint are prone to multiple remote vulnerabilities. Very little information is currently available. We will update this BID as more information emerges. \nSuccessfully exploiting these issues allows remote attackers to crash the service and potentially to execute arbitrary code. This may facilitate the complete compromise of affected computers. \nThe following versions are affected:\n- SAPlpd as included with SAP GUI 7.10 (and earlier)\n- Versions prior to SAPSprint 1018\nThis issue is reportedly documented in SAP Note 1138934. \n\nPROVIDED AND/OR DISCOVERED BY:\nOriginally reported in SAPLPD by Luigi Auriemma. \n\n----------------------------------------------------------------------\n\nA new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI\nhas been released. The new version includes many new and advanced\nfeatures, which makes it even easier to stay patched. \n\nDownload and test it today:\nhttps://psi.secunia.com/\n\nRead more about this new version:\nhttps://psi.secunia.com/?page=changelog\n\n----------------------------------------------------------------------\n\nTITLE:\nSAP GUI SAPLPD Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA28786\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/28786/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nDoS, System access\n\nWHERE:\n\u003eFrom local network\n\nSOFTWARE:\nSAP GUI 7.x\nhttp://secunia.com/product/16959/\n\nDESCRIPTION:\nLuigi Auriemma has discovered some vulnerabilities in SAP GUI, which\ncan be exploited by malicious people to cause a DoS (Denial of\nService) or to potentially compromise a vulnerable system. \n\n1) Multiple boundary errors exist in the SAPLPD server when\nprocessing LPD commands. \n\nSuccessful exploitation may allow execution of arbitrary code. \n\n2) An error in SAPLPD when processing the 0x53 LPD command code can\nbe exploited to terminate an affected server. Other versions may also be affected. \n\nSOLUTION:\nRestrict access to TCP port 515. The vendor will reportedly release a\npatch soon. \n\nPROVIDED AND/OR DISCOVERED BY:\nLuigi Auriemma\n\nORIGINAL ADVISORY:\nhttp://aluigi.altervista.org/adv/saplpdz-adv.txt\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2008-0621" }, { "db": "JVNDB", "id": "JVNDB-2008-005442" }, { "db": "BID", "id": "27613" }, { "db": "PACKETSTORM", "id": "63373" }, { "db": "PACKETSTORM", "id": "63283" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2008-0621", "trust": 2.7 }, { "db": "BID", "id": "27613", "trust": 1.9 }, { "db": "SECUNIA", "id": "28811", "trust": 1.7 }, { "db": "SECUNIA", "id": "28786", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2008-0438", "trust": 1.6 }, { "db": "VUPEN", "id": "ADV-2008-0409", "trust": 1.6 }, { "db": "SECTRACK", "id": "1019300", "trust": 1.6 }, { "db": "EXPLOIT-DB", "id": "5079", "trust": 1.6 }, { "db": "SREASON", "id": "3619", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2008-005442", "trust": 0.8 }, { "db": "MILW0RM", "id": "5079", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20080204 MULTIPLE VULNERABILITIES IN SAPLPD 6.28", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20080205 RE: MULTIPLE VULNERABILITIES IN SAPLPD 6.28", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200802-088", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "63373", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "63283", "trust": 0.1 } ], "sources": [ { "db": "BID", "id": "27613" }, { "db": "JVNDB", "id": "JVNDB-2008-005442" }, { "db": "PACKETSTORM", "id": "63373" }, { "db": "PACKETSTORM", "id": "63283" }, { "db": "CNNVD", "id": "CNNVD-200802-088" }, { "db": "NVD", "id": "CVE-2008-0621" } ] }, "id": "VAR-200802-0423", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.25 }, "last_update_date": "2024-11-23T22:43:14.445000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SAP GUI", "trust": 0.8, "url": "http://sapdocs.info/sap/other/download-sap-gui-7-20/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-005442" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-005442" }, { "db": "NVD", "id": "CVE-2008-0621" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "http://www.securitytracker.com/id?1019300" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/27613" }, { "trust": 1.6, "url": "http://secunia.com/advisories/28786" }, { "trust": 1.6, "url": "http://securityreason.com/securityalert/3619" }, { "trust": 1.6, "url": "http://secunia.com/advisories/28811" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2008/0438" }, { "trust": 1.0, "url": "https://www.exploit-db.com/exploits/5079" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2008/0409" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0621" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-0621" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/487575/100/0/threaded" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/487508/100/0/threaded" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/0409" }, { "trust": 0.6, "url": "http://www.milw0rm.com/exploits/5079" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/0438" }, { "trust": 0.3, "url": "/archive/1/487508" }, { "trust": 0.3, "url": "/archive/1/487575" }, { "trust": 0.2, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.2, "url": "http://secunia.com/advisories/28786/" }, { "trust": 0.2, "url": "https://psi.secunia.com/?page=changelog" }, { "trust": 0.2, "url": "https://psi.secunia.com/" }, { "trust": 0.2, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.2, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/28811/" }, { "trust": 0.1, "url": "http://secunia.com/product/17480/" }, { "trust": 0.1, "url": "http://secunia.com/product/16959/" }, { "trust": 0.1, "url": "http://aluigi.altervista.org/adv/saplpdz-adv.txt" } ], "sources": [ { "db": "BID", "id": "27613" }, { "db": "JVNDB", "id": "JVNDB-2008-005442" }, { "db": "PACKETSTORM", "id": "63373" }, { "db": "PACKETSTORM", "id": "63283" }, { "db": "CNNVD", "id": "CNNVD-200802-088" }, { "db": "NVD", "id": "CVE-2008-0621" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "27613" }, { "db": "JVNDB", "id": "JVNDB-2008-005442" }, { "db": "PACKETSTORM", "id": "63373" }, { "db": "PACKETSTORM", "id": "63283" }, { "db": "CNNVD", "id": "CNNVD-200802-088" }, { "db": "NVD", "id": "CVE-2008-0621" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-02-04T00:00:00", "db": "BID", "id": "27613" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-005442" }, { "date": "2008-02-08T01:19:15", "db": "PACKETSTORM", "id": "63373" }, { "date": "2008-02-05T23:02:25", "db": "PACKETSTORM", "id": "63283" }, { "date": "2008-02-06T00:00:00", "db": "CNNVD", "id": "CNNVD-200802-088" }, { "date": "2008-02-06T12:00:00", "db": "NVD", "id": "CVE-2008-0621" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-07-05T22:00:00", "db": "BID", "id": "27613" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-005442" }, { "date": "2008-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-200802-088" }, { "date": "2024-11-21T00:42:31.793000", "db": "NVD", "id": "CVE-2008-0621" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200802-088" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SAP GUI and SAPSprint include SAPLPD Vulnerable to buffer overflow", "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-005442" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-200802-088" } ], "trust": 0.6 } }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:sap_r_3:*:*:*:*:*:*:*:*", "matchCriteriaId": "812BDEE8-05CD-40A7-9BF0-263C5AE9024F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sapgui:4.6c:*:windows:*:*:*:*:*", "matchCriteriaId": "33C7A581-C3CF-468F-8B06-1C9F227D5967", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sapgui:4.6d:*:windows:*:*:*:*:*", "matchCriteriaId": "4FCC8060-E285-43BA-9626-D9CB960A964D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The default installation of SAP R/3 46C/D allows remote attackers to bypass account locking by using the RFC API instead of the SAPGUI to conduct a brute force password guessing attack, which does not lock out the account like the SAPGUI does." }, { "lang": "es", "value": "La instalaci\u00f3n por defecto de SAP R/3 46C/D permite a atacantes remotos saltarse bloqueos de cuentas usando la API RFC en lugar de SAPGUI para hacer ataques de fuerza bruta para averiguar la contrase\u00f1a, lo cual no bloquea las cuentas como lo hace SAPGUI." } ], "id": "CVE-2003-1035", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-04-15T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004039.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/451378/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/7007" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11487" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004039.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/451378/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/7007" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11487" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:sapgui:7.10:*:*:*:*:*:*:*", "matchCriteriaId": "BCEAAEEF-62DE-4BDD-846A-EA746FC4AADC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:saplpd:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F9C73A3-56A4-41C3-895A-4D49608B2946", "versionEndIncluding": "6.28", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sapsprint:*:*:*:*:*:*:*:*", "matchCriteriaId": "ADF65E3D-45F1-4491-8532-B5BE4F6CD2E4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en SAPLPD 6.28 y anteriores incluidas en SAP GUI 7.10 y SAPSprint antes de 1018. Permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de argumentos largos a los comandos 1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04 y (5) 0x05 LPD." } ], "id": "CVE-2008-0621", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-02-06T12:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28786" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/28811" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3619" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/27613" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1019300" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/0409" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/0438" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/5079" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28786" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28811" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3619" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/27613" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019300" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0409" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0438" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/5079" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:sapgui:7.10:*:*:*:*:*:*:*", "matchCriteriaId": "BCEAAEEF-62DE-4BDD-846A-EA746FC4AADC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:saplpd:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F9C73A3-56A4-41C3-895A-4D49608B2946", "versionEndIncluding": "6.28", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sapsprint:*:*:*:*:*:*:*:*", "matchCriteriaId": "ADF65E3D-45F1-4491-8532-B5BE4F6CD2E4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to cause a denial of service (crash) via a 0x53 LPD command, which causes the server to terminate." }, { "lang": "es", "value": "SAPLPD 6.28 y anteriores incluidas en SAP GUI 7.10 y SAPSprint antes de 1018. permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de un comando 0x53 LPD, lo que provoca que el servidor termine." } ], "id": "CVE-2008-0620", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-02-06T12:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28786" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/28811" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3619" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/27613" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1019300" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/0409" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/0438" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28786" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28811" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3619" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/27613" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019300" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0409" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0438" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
sap | sapgui | * | |
simba_technologies | mdrmsap_activex_control | * | |
microsoft | internet_explorer | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:sapgui:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B5B9DE5-0BD7-48C8-B09C-1F1E1AB58F69", "vulnerable": true }, { "criteria": "cpe:2.3:a:simba_technologies:mdrmsap_activex_control:*:*:*:*:*:*:*:*", "matchCriteriaId": "9956870B-8039-46E9-9839-ECD464D08CE8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*", "matchCriteriaId": "8682FAF3-98E3-485C-89CB-C0358C4E2AB0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the Simba MDrmSap ActiveX control in mdrmsap.dll in SAP SAPgui allows remote attackers to execute arbitrary code via unknown vectors involving instantiation by Internet Explorer." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el control ActiveX MDrmSap de Simba en mdrmsap.dll en SAP SAPgui permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante vectores desconocidos que involucran la instanciaci\u00f3n por Internet Explorer." } ], "evaluatorSolution": "Patch Information (SAP Login Required) = http://service.sap.com/sap/support/notes/1142431", "id": "CVE-2008-4387", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-11-10T16:15:04.907", "references": [ { "source": "cret@cert.org", "url": "http://osvdb.org/49721" }, { "source": "cret@cert.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/277313" }, { "source": "cret@cert.org", "url": "http://www.securityfocus.com/bid/32186" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2008/3106" }, { "source": "cret@cert.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46440" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/49721" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/277313" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/32186" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/3106" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46440" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:sapgui:4.6:*:windows:*:*:*:*:*", "matchCriteriaId": "E63EC32D-4655-4B26-9E1A-8E33257050F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sapgui:4.6a:*:windows:*:*:*:*:*", "matchCriteriaId": "D26797AD-F444-4918-AE21-11E9546C9FF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sapgui:4.6b:*:windows:*:*:*:*:*", "matchCriteriaId": "8E59FDE0-8BF8-4BF3-AE4F-E7F810216A12", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sapgui:4.6c:*:windows:*:*:*:*:*", "matchCriteriaId": "33C7A581-C3CF-468F-8B06-1C9F227D5967", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sapgui:4.6d:*:windows:*:*:*:*:*", "matchCriteriaId": "4FCC8060-E285-43BA-9626-D9CB960A964D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP GUI (Sapgui) 4.6D allows remote attackers to cause a denial of service (crash) via a connection to a high-numbered port, which generates an \"unknown connection data\" error." }, { "lang": "es", "value": "SAP GUI (Sapgui) 4.6D permite a atacantes remotos causar una denegaci\u00f3n de servicio mediante una conexi\u00f3n a un puerto con un n\u00famero alto, que genera un un error \"conexi\u00f3n de datos desconocida\"." } ], "id": "CVE-2002-1579", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-04-15T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-01/0334.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/3972" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8007" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2002-01/0334.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/3972" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/8007" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:sapgui:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B5B9DE5-0BD7-48C8-B09C-1F1E1AB58F69", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sapgui:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B6AAD82-9A2F-41E1-87B3-69C501D5884C", "versionEndIncluding": "7.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sapgui:4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E38F14B4-7A3D-4F54-9C8F-C1C43676AC2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sapgui:4.6:*:windows:*:*:*:*:*", "matchCriteriaId": "E63EC32D-4655-4B26-9E1A-8E33257050F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sapgui:4.6a:*:*:*:*:*:*:*", "matchCriteriaId": "852B75EA-0C2F-4549-A412-EA283EF18120", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sapgui:4.6a:*:windows:*:*:*:*:*", "matchCriteriaId": "D26797AD-F444-4918-AE21-11E9546C9FF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sapgui:4.6b:*:*:*:*:*:*:*", "matchCriteriaId": "E9A7356A-E8B4-4550-A30B-FE7C0B3BE65D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sapgui:4.6b:*:windows:*:*:*:*:*", "matchCriteriaId": "8E59FDE0-8BF8-4BF3-AE4F-E7F810216A12", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sapgui:4.6c:*:*:*:*:*:*:*", "matchCriteriaId": "EB4E3BF3-7460-46AA-AABF-CA46360EF83F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sapgui:4.6c:*:windows:*:*:*:*:*", "matchCriteriaId": "33C7A581-C3CF-468F-8B06-1C9F227D5967", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sapgui:4.6d:*:*:*:*:*:*:*", "matchCriteriaId": "CE53A838-0367-4D67-9CB2-DDAF275FE7B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sapgui:4.6d:*:windows:*:*:*:*:*", "matchCriteriaId": "4FCC8060-E285-43BA-9626-D9CB960A964D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sapgui:6.40:*:*:*:*:*:*:*", "matchCriteriaId": "DC699787-C1C8-4EF4-8587-617FC9CCED14", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in EAI WebViewer3D ActiveX control (webviewer3d.dll) in SAP AG SAPgui before 7.10 Patch Level 9 allows remote attackers to execute arbitrary code via a long argument to the SaveViewToSessionFile method." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en el control ActiveX de EAI WebViewer3D (webviewer3d.dll) en SAP AG SAPgui versiones anteriores a v7.10 Patch Level 9 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un argumento largo del m\u00e9todo SaveViewToSessionFile." } ], "id": "CVE-2007-4475", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-04-01T18:30:00.547", "references": [ { "source": "cret@cert.org", "url": "http://secunia.com/advisories/34559" }, { "source": "cret@cert.org", "tags": [ "Patch", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/985449" }, { "source": "cret@cert.org", "url": "http://www.securityfocus.com/bid/34310" }, { "source": "cret@cert.org", "url": "http://www.vupen.com/english/advisories/2009/0892" }, { "source": "cret@cert.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49543" }, { "source": "cret@cert.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://service.sap.com/sap/support/notes/1153794" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34559" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/985449" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/34310" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/0892" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49543" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://service.sap.com/sap/support/notes/1153794" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }