Vulnerabilites related to sap - sapsprint
CVE-2008-0621 (GCVE-0-2008-0621)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/28786 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/archive/1/487575/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.vupen.com/english/advisories/2008/0409 | vdb-entry, x_refsource_VUPEN | |
http://www.securitytracker.com/id?1019300 | vdb-entry, x_refsource_SECTRACK | |
http://securityreason.com/securityalert/3619 | third-party-advisory, x_refsource_SREASON | |
http://www.securityfocus.com/archive/1/487508/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.vupen.com/english/advisories/2008/0438 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/28811 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/27613 | vdb-entry, x_refsource_BID | |
https://www.exploit-db.com/exploits/5079 | exploit, x_refsource_EXPLOIT-DB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:54:23.070Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "28786", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28786" }, { "name": "20080205 Re: Multiple vulnerabilities in SAPlpd 6.28", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded" }, { "name": "ADV-2008-0409", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0409" }, { "name": "1019300", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019300" }, { "name": "3619", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3619" }, { "name": "20080204 Multiple vulnerabilities in SAPlpd 6.28", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded" }, { "name": "ADV-2008-0438", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0438" }, { "name": "28811", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28811" }, { "name": "27613", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27613" }, { "name": "5079", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/5079" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-02-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "28786", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28786" }, { "name": "20080205 Re: Multiple vulnerabilities in SAPlpd 6.28", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded" }, { "name": "ADV-2008-0409", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0409" }, { "name": "1019300", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019300" }, { "name": "3619", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3619" }, { "name": "20080204 Multiple vulnerabilities in SAPlpd 6.28", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded" }, { "name": "ADV-2008-0438", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0438" }, { "name": "28811", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28811" }, { "name": "27613", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27613" }, { "name": "5079", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/5079" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0621", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "28786", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28786" }, { "name": "20080205 Re: Multiple vulnerabilities in SAPlpd 6.28", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded" }, { "name": "ADV-2008-0409", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0409" }, { "name": "1019300", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019300" }, { "name": "3619", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3619" }, { "name": "20080204 Multiple vulnerabilities in SAPlpd 6.28", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded" }, { "name": "ADV-2008-0438", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0438" }, { "name": "28811", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28811" }, { "name": "27613", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27613" }, { "name": "5079", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/5079" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-0621", "datePublished": "2008-02-06T11:00:00", "dateReserved": "2008-02-05T00:00:00", "dateUpdated": "2024-08-07T07:54:23.070Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-0620 (GCVE-0-2008-0620)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/28786 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/archive/1/487575/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.vupen.com/english/advisories/2008/0409 | vdb-entry, x_refsource_VUPEN | |
http://www.securitytracker.com/id?1019300 | vdb-entry, x_refsource_SECTRACK | |
http://securityreason.com/securityalert/3619 | third-party-advisory, x_refsource_SREASON | |
http://www.securityfocus.com/archive/1/487508/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://www.vupen.com/english/advisories/2008/0438 | vdb-entry, x_refsource_VUPEN | |
http://secunia.com/advisories/28811 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/27613 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:54:22.588Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "28786", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28786" }, { "name": "20080205 Re: Multiple vulnerabilities in SAPlpd 6.28", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded" }, { "name": "ADV-2008-0409", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0409" }, { "name": "1019300", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019300" }, { "name": "3619", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3619" }, { "name": "20080204 Multiple vulnerabilities in SAPlpd 6.28", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded" }, { "name": "ADV-2008-0438", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0438" }, { "name": "28811", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28811" }, { "name": "27613", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27613" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-02-04T00:00:00", "descriptions": [ { "lang": "en", "value": "SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to cause a denial of service (crash) via a 0x53 LPD command, which causes the server to terminate." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "28786", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28786" }, { "name": "20080205 Re: Multiple vulnerabilities in SAPlpd 6.28", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded" }, { "name": "ADV-2008-0409", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0409" }, { "name": "1019300", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019300" }, { "name": "3619", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3619" }, { "name": "20080204 Multiple vulnerabilities in SAPlpd 6.28", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded" }, { "name": "ADV-2008-0438", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0438" }, { "name": "28811", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28811" }, { "name": "27613", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27613" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0620", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to cause a denial of service (crash) via a 0x53 LPD command, which causes the server to terminate." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "28786", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28786" }, { "name": "20080205 Re: Multiple vulnerabilities in SAPlpd 6.28", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded" }, { "name": "ADV-2008-0409", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0409" }, { "name": "1019300", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019300" }, { "name": "3619", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3619" }, { "name": "20080204 Multiple vulnerabilities in SAPlpd 6.28", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded" }, { "name": "ADV-2008-0438", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0438" }, { "name": "28811", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28811" }, { "name": "27613", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27613" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-0620", "datePublished": "2008-02-06T11:00:00", "dateReserved": "2008-02-05T00:00:00", "dateUpdated": "2024-08-07T07:54:22.588Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-7220 (GCVE-0-2006-7220)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/19756 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:57:41.053Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "19756", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19756" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in SAP SAPLPD and SAPSPRINT allows remote attackers to cause a denial of service (application crash) via a certain print job request. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-07-10T00:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "19756", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19756" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-7220", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in SAP SAPLPD and SAPSPRINT allows remote attackers to cause a denial of service (application crash) via a certain print job request. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "19756", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19756" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-7220", "datePublished": "2007-07-10T00:00:00Z", "dateReserved": "2007-07-09T00:00:00Z", "dateUpdated": "2024-09-17T03:12:22.672Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-200802-0423
Vulnerability from variot
Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands. SAPlpd and SAPSprint are prone to multiple remote vulnerabilities. Very little information is currently available. We will update this BID as more information emerges. Successfully exploiting these issues allows remote attackers to crash the service and potentially to execute arbitrary code. This may facilitate the complete compromise of affected computers. The following versions are affected: - SAPlpd as included with SAP GUI 7.10 (and earlier) - Versions prior to SAPSprint 1018 This issue is reportedly documented in SAP Note 1138934.
PROVIDED AND/OR DISCOVERED BY: Originally reported in SAPLPD by Luigi Auriemma.
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched.
Download and test it today: https://psi.secunia.com/
Read more about this new version: https://psi.secunia.com/?page=changelog
TITLE: SAP GUI SAPLPD Multiple Vulnerabilities
SECUNIA ADVISORY ID: SA28786
VERIFY ADVISORY: http://secunia.com/advisories/28786/
CRITICAL: Moderately critical
IMPACT: DoS, System access
WHERE:
From local network
SOFTWARE: SAP GUI 7.x http://secunia.com/product/16959/
DESCRIPTION: Luigi Auriemma has discovered some vulnerabilities in SAP GUI, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system.
1) Multiple boundary errors exist in the SAPLPD server when processing LPD commands.
Successful exploitation may allow execution of arbitrary code.
2) An error in SAPLPD when processing the 0x53 LPD command code can be exploited to terminate an affected server. Other versions may also be affected.
SOLUTION: Restrict access to TCP port 515. The vendor will reportedly release a patch soon.
PROVIDED AND/OR DISCOVERED BY: Luigi Auriemma
ORIGINAL ADVISORY: http://aluigi.altervista.org/adv/saplpdz-adv.txt
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200802-0423", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sapgui", "scope": "eq", "trust": 2.4, "vendor": "sap", "version": "7.10" }, { "model": "saplpd", "scope": "lte", "trust": 1.8, "vendor": "sap", "version": "6.28" }, { "model": "sapsprint", "scope": "eq", "trust": 1.0, "vendor": "sap", "version": "*" }, { "model": "saplpd", "scope": "eq", "trust": 0.9, "vendor": "sap", "version": "6.28" }, { "model": "sapsprint", "scope": "lt", "trust": 0.8, "vendor": "sap", "version": "1018" }, { "model": "sapsprint", "scope": null, "trust": 0.6, "vendor": "sap", "version": null }, { "model": "sapsprint", "scope": "eq", "trust": 0.3, "vendor": "sap", "version": "0" }, { "model": "saplpd", "scope": "eq", "trust": 0.3, "vendor": "sap", "version": "0" }, { "model": "sapsprint", "scope": "ne", "trust": 0.3, "vendor": "sap", "version": "1018" }, { "model": "gui for windows patch level", "scope": "ne", "trust": 0.3, "vendor": "sap", "version": "7.006" }, { "model": "gui for windows patch level", "scope": "ne", "trust": 0.3, "vendor": "sap", "version": "6.4030" }, { "model": "gui for windows patch level", "scope": "ne", "trust": 0.3, "vendor": "sap", "version": "6.2072" } ], "sources": [ { "db": "BID", "id": "27613" }, { "db": "JVNDB", "id": "JVNDB-2008-005442" }, { "db": "CNNVD", "id": "CNNVD-200802-088" }, { "db": "NVD", "id": "CVE-2008-0621" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:sap:sapgui", "vulnerable": true }, { "cpe22Uri": "cpe:/a:sap:saplpd", "vulnerable": true }, { "cpe22Uri": "cpe:/a:sap:sapsprint", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-005442" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Luigi Auriemma aluigi@pivx.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200802-088" } ], "trust": 0.6 }, "cve": "CVE-2008-0621", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2008-0621", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2008-0621", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2008-0621", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200802-088", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-005442" }, { "db": "CNNVD", "id": "CNNVD-200802-088" }, { "db": "NVD", "id": "CVE-2008-0621" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands. SAPlpd and SAPSprint are prone to multiple remote vulnerabilities. Very little information is currently available. We will update this BID as more information emerges. \nSuccessfully exploiting these issues allows remote attackers to crash the service and potentially to execute arbitrary code. This may facilitate the complete compromise of affected computers. \nThe following versions are affected:\n- SAPlpd as included with SAP GUI 7.10 (and earlier)\n- Versions prior to SAPSprint 1018\nThis issue is reportedly documented in SAP Note 1138934. \n\nPROVIDED AND/OR DISCOVERED BY:\nOriginally reported in SAPLPD by Luigi Auriemma. \n\n----------------------------------------------------------------------\n\nA new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI\nhas been released. The new version includes many new and advanced\nfeatures, which makes it even easier to stay patched. \n\nDownload and test it today:\nhttps://psi.secunia.com/\n\nRead more about this new version:\nhttps://psi.secunia.com/?page=changelog\n\n----------------------------------------------------------------------\n\nTITLE:\nSAP GUI SAPLPD Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA28786\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/28786/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nDoS, System access\n\nWHERE:\n\u003eFrom local network\n\nSOFTWARE:\nSAP GUI 7.x\nhttp://secunia.com/product/16959/\n\nDESCRIPTION:\nLuigi Auriemma has discovered some vulnerabilities in SAP GUI, which\ncan be exploited by malicious people to cause a DoS (Denial of\nService) or to potentially compromise a vulnerable system. \n\n1) Multiple boundary errors exist in the SAPLPD server when\nprocessing LPD commands. \n\nSuccessful exploitation may allow execution of arbitrary code. \n\n2) An error in SAPLPD when processing the 0x53 LPD command code can\nbe exploited to terminate an affected server. Other versions may also be affected. \n\nSOLUTION:\nRestrict access to TCP port 515. The vendor will reportedly release a\npatch soon. \n\nPROVIDED AND/OR DISCOVERED BY:\nLuigi Auriemma\n\nORIGINAL ADVISORY:\nhttp://aluigi.altervista.org/adv/saplpdz-adv.txt\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2008-0621" }, { "db": "JVNDB", "id": "JVNDB-2008-005442" }, { "db": "BID", "id": "27613" }, { "db": "PACKETSTORM", "id": "63373" }, { "db": "PACKETSTORM", "id": "63283" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2008-0621", "trust": 2.7 }, { "db": "BID", "id": "27613", "trust": 1.9 }, { "db": "SECUNIA", "id": "28811", "trust": 1.7 }, { "db": "SECUNIA", "id": "28786", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2008-0438", "trust": 1.6 }, { "db": "VUPEN", "id": "ADV-2008-0409", "trust": 1.6 }, { "db": "SECTRACK", "id": "1019300", "trust": 1.6 }, { "db": "EXPLOIT-DB", "id": "5079", "trust": 1.6 }, { "db": "SREASON", "id": "3619", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2008-005442", "trust": 0.8 }, { "db": "MILW0RM", "id": "5079", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20080204 MULTIPLE VULNERABILITIES IN SAPLPD 6.28", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20080205 RE: MULTIPLE VULNERABILITIES IN SAPLPD 6.28", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200802-088", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "63373", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "63283", "trust": 0.1 } ], "sources": [ { "db": "BID", "id": "27613" }, { "db": "JVNDB", "id": "JVNDB-2008-005442" }, { "db": "PACKETSTORM", "id": "63373" }, { "db": "PACKETSTORM", "id": "63283" }, { "db": "CNNVD", "id": "CNNVD-200802-088" }, { "db": "NVD", "id": "CVE-2008-0621" } ] }, "id": "VAR-200802-0423", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.25 }, "last_update_date": "2024-11-23T22:43:14.445000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SAP GUI", "trust": 0.8, "url": "http://sapdocs.info/sap/other/download-sap-gui-7-20/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-005442" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-005442" }, { "db": "NVD", "id": "CVE-2008-0621" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "http://www.securitytracker.com/id?1019300" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/27613" }, { "trust": 1.6, "url": "http://secunia.com/advisories/28786" }, { "trust": 1.6, "url": "http://securityreason.com/securityalert/3619" }, { "trust": 1.6, "url": "http://secunia.com/advisories/28811" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2008/0438" }, { "trust": 1.0, "url": "https://www.exploit-db.com/exploits/5079" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2008/0409" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0621" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-0621" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/487575/100/0/threaded" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/487508/100/0/threaded" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/0409" }, { "trust": 0.6, "url": "http://www.milw0rm.com/exploits/5079" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/0438" }, { "trust": 0.3, "url": "/archive/1/487508" }, { "trust": 0.3, "url": "/archive/1/487575" }, { "trust": 0.2, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.2, "url": "http://secunia.com/advisories/28786/" }, { "trust": 0.2, "url": "https://psi.secunia.com/?page=changelog" }, { "trust": 0.2, "url": "https://psi.secunia.com/" }, { "trust": 0.2, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.2, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/28811/" }, { "trust": 0.1, "url": "http://secunia.com/product/17480/" }, { "trust": 0.1, "url": "http://secunia.com/product/16959/" }, { "trust": 0.1, "url": "http://aluigi.altervista.org/adv/saplpdz-adv.txt" } ], "sources": [ { "db": "BID", "id": "27613" }, { "db": "JVNDB", "id": "JVNDB-2008-005442" }, { "db": "PACKETSTORM", "id": "63373" }, { "db": "PACKETSTORM", "id": "63283" }, { "db": "CNNVD", "id": "CNNVD-200802-088" }, { "db": "NVD", "id": "CVE-2008-0621" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "27613" }, { "db": "JVNDB", "id": "JVNDB-2008-005442" }, { "db": "PACKETSTORM", "id": "63373" }, { "db": "PACKETSTORM", "id": "63283" }, { "db": "CNNVD", "id": "CNNVD-200802-088" }, { "db": "NVD", "id": "CVE-2008-0621" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-02-04T00:00:00", "db": "BID", "id": "27613" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-005442" }, { "date": "2008-02-08T01:19:15", "db": "PACKETSTORM", "id": "63373" }, { "date": "2008-02-05T23:02:25", "db": "PACKETSTORM", "id": "63283" }, { "date": "2008-02-06T00:00:00", "db": "CNNVD", "id": "CNNVD-200802-088" }, { "date": "2008-02-06T12:00:00", "db": "NVD", "id": "CVE-2008-0621" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-07-05T22:00:00", "db": "BID", "id": "27613" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-005442" }, { "date": "2008-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-200802-088" }, { "date": "2024-11-21T00:42:31.793000", "db": "NVD", "id": "CVE-2008-0621" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200802-088" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SAP GUI and SAPSprint include SAPLPD Vulnerable to buffer overflow", "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-005442" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-200802-088" } ], "trust": 0.6 } }
var-200802-0422
Vulnerability from variot
SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to cause a denial of service (crash) via a 0x53 LPD command, which causes the server to terminate. SAPlpd and SAPSprint are prone to multiple remote vulnerabilities. Very little information is currently available. We will update this BID as more information emerges. This may facilitate the complete compromise of affected computers. The following versions are affected: - SAPlpd as included with SAP GUI 7.10 (and earlier) - Versions prior to SAPSprint 1018 This issue is reportedly documented in SAP Note 1138934.
PROVIDED AND/OR DISCOVERED BY: Originally reported in SAPLPD by Luigi Auriemma.
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched.
Download and test it today: https://psi.secunia.com/
Read more about this new version: https://psi.secunia.com/?page=changelog
TITLE: SAP GUI SAPLPD Multiple Vulnerabilities
SECUNIA ADVISORY ID: SA28786
VERIFY ADVISORY: http://secunia.com/advisories/28786/
CRITICAL: Moderately critical
IMPACT: DoS, System access
WHERE:
From local network
SOFTWARE: SAP GUI 7.x http://secunia.com/product/16959/
DESCRIPTION: Luigi Auriemma has discovered some vulnerabilities in SAP GUI, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system.
1) Multiple boundary errors exist in the SAPLPD server when processing LPD commands. This can be exploited to cause buffer overflows via overly long arguments passed to the LPD commands having the following codes: 0x01, 0x02, 0x03, 0x04, 0x05, 0x31, 0x32, 0x33, 0x34, and 0x35.
Successful exploitation may allow execution of arbitrary code.
2) An error in SAPLPD when processing the 0x53 LPD command code can be exploited to terminate an affected server. Other versions may also be affected.
SOLUTION: Restrict access to TCP port 515. The vendor will reportedly release a patch soon.
PROVIDED AND/OR DISCOVERED BY: Luigi Auriemma
ORIGINAL ADVISORY: http://aluigi.altervista.org/adv/saplpdz-adv.txt
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200802-0422", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sapgui", "scope": "eq", "trust": 2.4, "vendor": "sap", "version": "7.10" }, { "model": "saplpd", "scope": "lte", "trust": 1.8, "vendor": "sap", "version": "6.28" }, { "model": "sapsprint", "scope": "eq", "trust": 1.0, "vendor": "sap", "version": "*" }, { "model": "saplpd", "scope": "eq", "trust": 0.9, "vendor": "sap", "version": "6.28" }, { "model": "sapsprint", "scope": "lt", "trust": 0.8, "vendor": "sap", "version": "1018" }, { "model": "sapsprint", "scope": null, "trust": 0.6, "vendor": "sap", "version": null }, { "model": "sapsprint", "scope": "eq", "trust": 0.3, "vendor": "sap", "version": "0" }, { "model": "saplpd", "scope": "eq", "trust": 0.3, "vendor": "sap", "version": "0" }, { "model": "sapsprint", "scope": "ne", "trust": 0.3, "vendor": "sap", "version": "1018" }, { "model": "gui for windows patch level", "scope": "ne", "trust": 0.3, "vendor": "sap", "version": "7.006" }, { "model": "gui for windows patch level", "scope": "ne", "trust": 0.3, "vendor": "sap", "version": "6.4030" }, { "model": "gui for windows patch level", "scope": "ne", "trust": 0.3, "vendor": "sap", "version": "6.2072" } ], "sources": [ { "db": "BID", "id": "27613" }, { "db": "JVNDB", "id": "JVNDB-2008-005441" }, { "db": "CNNVD", "id": "CNNVD-200802-087" }, { "db": "NVD", "id": "CVE-2008-0620" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:sap:sapgui", "vulnerable": true }, { "cpe22Uri": "cpe:/a:sap:saplpd", "vulnerable": true }, { "cpe22Uri": "cpe:/a:sap:sapsprint", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-005441" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Luigi Auriemma\u203b aluigi@pivx.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200802-087" } ], "trust": 0.6 }, "cve": "CVE-2008-0620", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2008-0620", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2008-0620", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2008-0620", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200802-087", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-005441" }, { "db": "CNNVD", "id": "CNNVD-200802-087" }, { "db": "NVD", "id": "CVE-2008-0620" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to cause a denial of service (crash) via a 0x53 LPD command, which causes the server to terminate. SAPlpd and SAPSprint are prone to multiple remote vulnerabilities. Very little information is currently available. We will update this BID as more information emerges. This may facilitate the complete compromise of affected computers. \nThe following versions are affected:\n- SAPlpd as included with SAP GUI 7.10 (and earlier)\n- Versions prior to SAPSprint 1018\nThis issue is reportedly documented in SAP Note 1138934. \n\nPROVIDED AND/OR DISCOVERED BY:\nOriginally reported in SAPLPD by Luigi Auriemma. \n\n----------------------------------------------------------------------\n\nA new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI\nhas been released. The new version includes many new and advanced\nfeatures, which makes it even easier to stay patched. \n\nDownload and test it today:\nhttps://psi.secunia.com/\n\nRead more about this new version:\nhttps://psi.secunia.com/?page=changelog\n\n----------------------------------------------------------------------\n\nTITLE:\nSAP GUI SAPLPD Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA28786\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/28786/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nDoS, System access\n\nWHERE:\n\u003eFrom local network\n\nSOFTWARE:\nSAP GUI 7.x\nhttp://secunia.com/product/16959/\n\nDESCRIPTION:\nLuigi Auriemma has discovered some vulnerabilities in SAP GUI, which\ncan be exploited by malicious people to cause a DoS (Denial of\nService) or to potentially compromise a vulnerable system. \n\n1) Multiple boundary errors exist in the SAPLPD server when\nprocessing LPD commands. This can be exploited to cause buffer\noverflows via overly long arguments passed to the LPD commands having\nthe following codes: 0x01, 0x02, 0x03, 0x04, 0x05, 0x31, 0x32, 0x33,\n0x34, and 0x35. \n\nSuccessful exploitation may allow execution of arbitrary code. \n\n2) An error in SAPLPD when processing the 0x53 LPD command code can\nbe exploited to terminate an affected server. Other versions may also be affected. \n\nSOLUTION:\nRestrict access to TCP port 515. The vendor will reportedly release a\npatch soon. \n\nPROVIDED AND/OR DISCOVERED BY:\nLuigi Auriemma\n\nORIGINAL ADVISORY:\nhttp://aluigi.altervista.org/adv/saplpdz-adv.txt\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2008-0620" }, { "db": "JVNDB", "id": "JVNDB-2008-005441" }, { "db": "BID", "id": "27613" }, { "db": "PACKETSTORM", "id": "63373" }, { "db": "PACKETSTORM", "id": "63283" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2008-0620", "trust": 2.7 }, { "db": "BID", "id": "27613", "trust": 1.9 }, { "db": "SECUNIA", "id": "28811", "trust": 1.7 }, { "db": "SECUNIA", "id": "28786", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2008-0438", "trust": 1.6 }, { "db": "VUPEN", "id": "ADV-2008-0409", "trust": 1.6 }, { "db": "SECTRACK", "id": "1019300", "trust": 1.6 }, { "db": "SREASON", "id": "3619", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2008-005441", "trust": 0.8 }, { "db": "BUGTRAQ", "id": "20080204 MULTIPLE VULNERABILITIES IN SAPLPD 6.28", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20080205 RE: MULTIPLE VULNERABILITIES IN SAPLPD 6.28", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200802-087", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "63373", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "63283", "trust": 0.1 } ], "sources": [ { "db": "BID", "id": "27613" }, { "db": "JVNDB", "id": "JVNDB-2008-005441" }, { "db": "PACKETSTORM", "id": "63373" }, { "db": "PACKETSTORM", "id": "63283" }, { "db": "CNNVD", "id": "CNNVD-200802-087" }, { "db": "NVD", "id": "CVE-2008-0620" } ] }, "id": "VAR-200802-0422", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.25 }, "last_update_date": "2024-11-23T22:43:14.406000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SAP GUI", "trust": 0.8, "url": "http://sapdocs.info/sap/other/download-sap-gui-7-20/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-005441" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-005441" }, { "db": "NVD", "id": "CVE-2008-0620" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "http://www.securitytracker.com/id?1019300" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/27613" }, { "trust": 1.6, "url": "http://secunia.com/advisories/28786" }, { "trust": 1.6, "url": "http://securityreason.com/securityalert/3619" }, { "trust": 1.6, "url": "http://secunia.com/advisories/28811" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2008/0438" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2008/0409" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0620" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-0620" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/487575/100/0/threaded" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/487508/100/0/threaded" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/0409" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/0438" }, { "trust": 0.3, "url": "/archive/1/487508" }, { "trust": 0.3, "url": "/archive/1/487575" }, { "trust": 0.2, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.2, "url": "http://secunia.com/advisories/28786/" }, { "trust": 0.2, "url": "https://psi.secunia.com/?page=changelog" }, { "trust": 0.2, "url": "https://psi.secunia.com/" }, { "trust": 0.2, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.2, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/28811/" }, { "trust": 0.1, "url": "http://secunia.com/product/17480/" }, { "trust": 0.1, "url": "http://secunia.com/product/16959/" }, { "trust": 0.1, "url": "http://aluigi.altervista.org/adv/saplpdz-adv.txt" } ], "sources": [ { "db": "BID", "id": "27613" }, { "db": "JVNDB", "id": "JVNDB-2008-005441" }, { "db": "PACKETSTORM", "id": "63373" }, { "db": "PACKETSTORM", "id": "63283" }, { "db": "CNNVD", "id": "CNNVD-200802-087" }, { "db": "NVD", "id": "CVE-2008-0620" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "27613" }, { "db": "JVNDB", "id": "JVNDB-2008-005441" }, { "db": "PACKETSTORM", "id": "63373" }, { "db": "PACKETSTORM", "id": "63283" }, { "db": "CNNVD", "id": "CNNVD-200802-087" }, { "db": "NVD", "id": "CVE-2008-0620" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-02-04T00:00:00", "db": "BID", "id": "27613" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-005441" }, { "date": "2008-02-08T01:19:15", "db": "PACKETSTORM", "id": "63373" }, { "date": "2008-02-05T23:02:25", "db": "PACKETSTORM", "id": "63283" }, { "date": "2008-02-06T00:00:00", "db": "CNNVD", "id": "CNNVD-200802-087" }, { "date": "2008-02-06T12:00:00", "db": "NVD", "id": "CVE-2008-0620" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-07-05T22:00:00", "db": "BID", "id": "27613" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-005441" }, { "date": "2008-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-200802-087" }, { "date": "2024-11-21T00:42:31.627000", "db": "NVD", "id": "CVE-2008-0620" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200802-087" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SAP GUI and SAPSprint include SAPLPD Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-005441" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-200802-087" } ], "trust": 0.6 } }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:sapgui:7.10:*:*:*:*:*:*:*", "matchCriteriaId": "BCEAAEEF-62DE-4BDD-846A-EA746FC4AADC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:saplpd:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F9C73A3-56A4-41C3-895A-4D49608B2946", "versionEndIncluding": "6.28", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sapsprint:*:*:*:*:*:*:*:*", "matchCriteriaId": "ADF65E3D-45F1-4491-8532-B5BE4F6CD2E4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to cause a denial of service (crash) via a 0x53 LPD command, which causes the server to terminate." }, { "lang": "es", "value": "SAPLPD 6.28 y anteriores incluidas en SAP GUI 7.10 y SAPSprint antes de 1018. permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de un comando 0x53 LPD, lo que provoca que el servidor termine." } ], "id": "CVE-2008-0620", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-02-06T12:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28786" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/28811" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3619" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/27613" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1019300" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/0409" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/0438" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28786" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28811" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3619" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/27613" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019300" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0409" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0438" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:sapgui:7.10:*:*:*:*:*:*:*", "matchCriteriaId": "BCEAAEEF-62DE-4BDD-846A-EA746FC4AADC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:saplpd:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F9C73A3-56A4-41C3-895A-4D49608B2946", "versionEndIncluding": "6.28", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sapsprint:*:*:*:*:*:*:*:*", "matchCriteriaId": "ADF65E3D-45F1-4491-8532-B5BE4F6CD2E4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en SAPLPD 6.28 y anteriores incluidas en SAP GUI 7.10 y SAPSprint antes de 1018. Permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de argumentos largos a los comandos 1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04 y (5) 0x05 LPD." } ], "id": "CVE-2008-0621", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-02-06T12:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28786" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/28811" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3619" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/27613" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1019300" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/0409" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/0438" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/5079" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28786" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28811" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3619" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/27613" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019300" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0409" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0438" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/5079" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:saplpd:*:*:*:*:*:*:*:*", "matchCriteriaId": "62BEB4F1-8C5D-462E-861D-BF291163585B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sapsprint:*:*:*:*:*:*:*:*", "matchCriteriaId": "ADF65E3D-45F1-4491-8532-B5BE4F6CD2E4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in SAP SAPLPD and SAPSPRINT allows remote attackers to cause a denial of service (application crash) via a certain print job request. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information." }, { "lang": "es", "value": "Vulnerabilidad no especificada en SAP SAPLPD y SAPSPRINT permite a atacantes remotos provocar denegaci\u00f3n de servicio (caida de aplicaci\u00f3n) a trav\u00e9s de una cierta respuesta de un trabajo de impresi\u00f3n. NOTA: la procedencia de esta informaci\u00f3n es desconocida; los detalles han sido obtenidos a partir de la informaci\u00f3n de terceros. \r\n" } ], "id": "CVE-2006-7220", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-07-10T00:30:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/19756" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/19756" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }