Vulnerabilites related to sap - tabone
var-200901-0399
Vulnerability from variot
Multiple heap-based buffer overflows in the AddTab method in the (1) Tab and (2) CTab ActiveX controls in c1sizer.ocx and the (3) TabOne ActiveX control in sizerone.ocx in ComponentOne SizerOne 8.0.20081.140, as used in ComponentOne Studio for ActiveX 2008, TSC2 Help Desk 4.1.8, SAP GUI 6.40 Patch 29 and 7.10, and possibly other products, allow remote attackers to execute arbitrary code by adding many tabs, or adding tabs with long tab captions. The SizerOne ActiveX control used in products by multiple vendors is prone to a buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer. An attacker can exploit this issue to execute arbitrary code within the context of the application that uses the ActiveX control (typically Internet Explorer). Failed exploit attempts will result in denial-of-service conditions.
====================================================================== 2) Severity
Rating: Highly critical Impact: System compromise Where: Remote
====================================================================== 3) Vendor's Description of Software
"SAP GUI is SAP's universal client for accessing SAP functionality in SAP applications such as - SAP ERP, SAP Business Suite (SAP CRM, SAP SCM and SAP PLM), SAP Business Intelligence and so on. SAP GUI functions like a browser. It gets information from the SAP server like what, where, when and how, to display contents in its window.".
Users can also set the kill-bit manually by following the procedure explained in SAP note 1092631. ======================================================================
Secunia Research 07/01/2009
- ComponentOne SizerOne ActiveX Control Buffer Overflow -
====================================================================== Table of Contents
Affected Software....................................................1 Severity.............................................................2 Vendor's Description of Software.....................................3 Description of Vulnerability.........................................4 Solution.............................................................5 Time Table...........................................................6 Credits..............................................................7 References...........................................................8 About Secunia........................................................9 Verification........................................................10
====================================================================== 1) Affected Software
- ComponentOne SizerOne 8.0.20081.140
NOTE: Other versions may also be affected.
====================================================================== 2) Severity
Rating: Highly critical Impact: System compromise Where: Remote
====================================================================== 3) Vendor's Description of Software
"ComponentOne SizerOne 8.0 is a four-in-one tool that includes two resizing controls to easily handle both simple and complex sizing. The tabbing control enables you to quickly create notebook-style and Microsoft Outlook-style tabs. And with the parsing control, you can automatically slice and dice strings."
Product Link: http://www.componentone.com/SuperProducts/SizerOne/
====================================================================== 4) Description of Vulnerability
Secunia Research has discovered a vulnerability in ComponentOne SizerOne, which can be exploited by malicious people to potentially compromise a user's system.
The vulnerability is caused by a boundary error in the included Tab ActiveX control (c1sizer.ocx) when copying tab captions. This can be exploited to cause a heap-based buffer overflow by e.g. adding tabs with overly long captions via the "AddTab()" method.
Successful exploitation may allow execution of arbitrary code.
====================================================================== 5) Solution
Update to version 8.0.20081.142 of the ActiveX control.
====================================================================== 6) Time Table
13/11/2008 - Vendor notified. 19/11/2008 - Vendor response. 25/11/2008 - Vendor informs that vulnerability has been fixed and offers to provide test version. 26/11/2008 - Copy of fixed test version requested. 01/12/2008 - Test version provided by the vendor. 02/12/2008 - Vendor informed that patch fixes vulnerability nicely. 02/12/2008 - Vendor informs that fix will be available within a week. 05/01/2008 - Status update requested. 05/01/2008 - Vendor informs that fix has been made available. 07/01/2009 - Public disclosure.
====================================================================== 7) Credits
Discovered by Carsten Eiram, Secunia Research.
====================================================================== 8) References
The Common Vulnerabilities and Exposures (CVE) project has assigned CVE-2008-4827 for the vulnerability.
====================================================================== 9) About Secunia
Secunia offers vulnerability management solutions to corporate customers with verified and reliable vulnerability intelligence relevant to their specific system configuration:
http://secunia.com/advisories/business_solutions/
Secunia also provides a publicly accessible and comprehensive advisory database as a service to the security community and private individuals, who are interested in or concerned about IT-security.
http://secunia.com/advisories/
Secunia believes that it is important to support the community and to do active vulnerability research in order to aid improving the security and reliability of software in general:
http://secunia.com/secunia_research/
Secunia regularly hires new skilled team members. Check the URL below to see currently vacant positions:
http://secunia.com/corporate/jobs/
Secunia offers a FREE mailing list called Secunia Security Advisories:
http://secunia.com/advisories/mailing_lists/
====================================================================== 10) Verification
Please verify this advisory by visiting the Secunia website: http://secunia.com/secunia_research/2008-52/
Complete list of vulnerability reports published by Secunia Research: http://secunia.com/secunia_research/
======================================================================
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . Other versions may also be affected.
ORIGINAL ADVISORY: Secunia Research: http://secunia.com/secunia_research/2008-53/
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200901-0399", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "gui", "scope": "eq", "trust": 2.1, "vendor": "sap", "version": "7.10" }, { "model": "sizerone", "scope": "eq", "trust": 2.1, "vendor": "componentone", "version": "8.0.20081.140" }, { "model": "tsc2 help desk", "scope": "eq", "trust": 1.6, "vendor": "servantix", "version": "4.18" }, { "model": "tsc2 help desk", "scope": "eq", "trust": 1.1, "vendor": "servantix", "version": "4.1.8" }, { "model": "tabone", "scope": "eq", "trust": 1.0, "vendor": "sap", "version": "7.0.0.16" }, { "model": "gui", "scope": "eq", "trust": 1.0, "vendor": "sap", "version": "6.40" }, { "model": "gui", "scope": "eq", "trust": 0.8, "vendor": "sap", "version": "6.40 patch 29" }, { "model": "gui patch", "scope": "eq", "trust": 0.3, "vendor": "sap", "version": "6.4029" }, { "model": "studio for activex", "scope": "eq", "trust": 0.3, "vendor": "componentone", "version": "20080" }, { "model": "studio enterprise", "scope": "eq", "trust": 0.3, "vendor": "componentone", "version": "20080" }, { "model": "tsc2 help desk", "scope": "ne", "trust": 0.3, "vendor": "servantix", "version": "4.3.1" }, { "model": "gui pl", "scope": "ne", "trust": 0.3, "vendor": "sap", "version": "7.10" }, { "model": "sizerone", "scope": "ne", "trust": 0.3, "vendor": "componentone", "version": "8.0.20081.142" } ], "sources": [ { "db": "BID", "id": "33148" }, { "db": "JVNDB", "id": "JVNDB-2009-001617" }, { "db": "CNNVD", "id": "CNNVD-200901-072" }, { "db": "NVD", "id": "CVE-2008-4827" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:componentone:sizerone", "vulnerable": true }, { "cpe22Uri": "cpe:/a:sap:gui", "vulnerable": true }, { "cpe22Uri": "cpe:/a:servantix:tsc2_help_desk", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-001617" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Carsten Eiram", "sources": [ { "db": "BID", "id": "33148" }, { "db": "PACKETSTORM", "id": "73654" }, { "db": "PACKETSTORM", "id": "73653" }, { "db": "PACKETSTORM", "id": "73652" }, { "db": "CNNVD", "id": "CNNVD-200901-072" } ], "trust": 1.2 }, "cve": "CVE-2008-4827", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2008-4827", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2008-4827", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2008-4827", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200901-072", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-001617" }, { "db": "CNNVD", "id": "CNNVD-200901-072" }, { "db": "NVD", "id": "CVE-2008-4827" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple heap-based buffer overflows in the AddTab method in the (1) Tab and (2) CTab ActiveX controls in c1sizer.ocx and the (3) TabOne ActiveX control in sizerone.ocx in ComponentOne SizerOne 8.0.20081.140, as used in ComponentOne Studio for ActiveX 2008, TSC2 Help Desk 4.1.8, SAP GUI 6.40 Patch 29 and 7.10, and possibly other products, allow remote attackers to execute arbitrary code by adding many tabs, or adding tabs with long tab captions. The SizerOne ActiveX control used in products by multiple vendors is prone to a buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer. \nAn attacker can exploit this issue to execute arbitrary code within the context of the application that uses the ActiveX control (typically Internet Explorer). Failed exploit attempts will result in denial-of-service conditions. \n\n====================================================================== \n2) Severity \n\nRating: Highly critical\nImpact: System compromise\nWhere: Remote\n\n====================================================================== \n3) Vendor\u0027s Description of Software \n\n\"SAP GUI is SAP\u0027s universal client for accessing SAP functionality in\nSAP applications such as - SAP ERP, SAP Business Suite (SAP CRM, SAP\nSCM and SAP PLM), SAP Business Intelligence and so on. SAP GUI\nfunctions like a browser. It gets information from the SAP server like\nwhat, where, when and how, to display contents in its window.\". \n\nUsers can also set the kill-bit manually by following the procedure \nexplained in SAP note 1092631. ====================================================================== \n\n Secunia Research 07/01/2009\n\n - ComponentOne SizerOne ActiveX Control Buffer Overflow -\n\n====================================================================== \nTable of Contents\n\nAffected Software....................................................1\nSeverity.............................................................2\nVendor\u0027s Description of Software.....................................3\nDescription of Vulnerability.........................................4\nSolution.............................................................5\nTime Table...........................................................6\nCredits..............................................................7\nReferences...........................................................8\nAbout Secunia........................................................9\nVerification........................................................10\n\n====================================================================== \n1) Affected Software \n\n* ComponentOne SizerOne 8.0.20081.140\n\nNOTE: Other versions may also be affected. \n\n====================================================================== \n2) Severity \n\nRating: Highly critical\nImpact: System compromise\nWhere: Remote\n\n====================================================================== \n3) Vendor\u0027s Description of Software \n\n\"ComponentOne SizerOne 8.0 is a four-in-one tool that includes two \nresizing controls to easily handle both simple and complex sizing. The\ntabbing control enables you to quickly create notebook-style and \nMicrosoft Outlook-style tabs. And with the parsing control, you can \nautomatically slice and dice strings.\"\n\nProduct Link:\nhttp://www.componentone.com/SuperProducts/SizerOne/\n\n====================================================================== \n4) Description of Vulnerability\n\nSecunia Research has discovered a vulnerability in ComponentOne \nSizerOne, which can be exploited by malicious people to potentially \ncompromise a user\u0027s system. \n\nThe vulnerability is caused by a boundary error in the included Tab \nActiveX control (c1sizer.ocx) when copying tab captions. This can be \nexploited to cause a heap-based buffer overflow by e.g. adding tabs \nwith overly long captions via the \"AddTab()\" method. \n\nSuccessful exploitation may allow execution of arbitrary code. \n\n====================================================================== \n5) Solution \n\nUpdate to version 8.0.20081.142 of the ActiveX control. \n\n====================================================================== \n6) Time Table \n\n13/11/2008 - Vendor notified. \n19/11/2008 - Vendor response. \n25/11/2008 - Vendor informs that vulnerability has been fixed and \n offers to provide test version. \n26/11/2008 - Copy of fixed test version requested. \n01/12/2008 - Test version provided by the vendor. \n02/12/2008 - Vendor informed that patch fixes vulnerability nicely. \n02/12/2008 - Vendor informs that fix will be available within a week. \n05/01/2008 - Status update requested. \n05/01/2008 - Vendor informs that fix has been made available. \n07/01/2009 - Public disclosure. \n\n====================================================================== \n7) Credits \n\nDiscovered by Carsten Eiram, Secunia Research. \n\n====================================================================== \n8) References\n\nThe Common Vulnerabilities and Exposures (CVE) project has assigned \nCVE-2008-4827 for the vulnerability. \n\n====================================================================== \n9) About Secunia\n\nSecunia offers vulnerability management solutions to corporate\ncustomers with verified and reliable vulnerability intelligence\nrelevant to their specific system configuration:\n\nhttp://secunia.com/advisories/business_solutions/\n\nSecunia also provides a publicly accessible and comprehensive advisory\ndatabase as a service to the security community and private \nindividuals, who are interested in or concerned about IT-security. \n\nhttp://secunia.com/advisories/\n\nSecunia believes that it is important to support the community and to\ndo active vulnerability research in order to aid improving the \nsecurity and reliability of software in general:\n\nhttp://secunia.com/secunia_research/\n\nSecunia regularly hires new skilled team members. Check the URL below\nto see currently vacant positions:\n\nhttp://secunia.com/corporate/jobs/\n\nSecunia offers a FREE mailing list called Secunia Security Advisories:\n\nhttp://secunia.com/advisories/mailing_lists/\n\n====================================================================== \n10) Verification \n\nPlease verify this advisory by visiting the Secunia website:\nhttp://secunia.com/secunia_research/2008-52/\n\nComplete list of vulnerability reports published by Secunia Research:\nhttp://secunia.com/secunia_research/\n\n======================================================================\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. Other versions may also\nbe affected. \n\nORIGINAL ADVISORY:\nSecunia Research:\nhttp://secunia.com/secunia_research/2008-53/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2008-4827" }, { "db": "JVNDB", "id": "JVNDB-2009-001617" }, { "db": "BID", "id": "33148" }, { "db": "PACKETSTORM", "id": "73654" }, { "db": "PACKETSTORM", "id": "73653" }, { "db": "PACKETSTORM", "id": "73652" }, { "db": "PACKETSTORM", "id": "73673" }, { "db": "PACKETSTORM", "id": "73675" }, { "db": "PACKETSTORM", "id": "73676" } ], "trust": 2.43 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2008-4827", "trust": 3.0 }, { "db": "BID", "id": "33148", "trust": 1.9 }, { "db": "SECUNIA", "id": "32672", "trust": 1.7 }, { "db": "SECUNIA", "id": "32609", "trust": 1.7 }, { "db": "SECUNIA", "id": "32648", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2009-0037", "trust": 1.6 }, { "db": "VUPEN", "id": "ADV-2009-0036", "trust": 1.6 }, { "db": "SECTRACK", "id": "1021529", "trust": 1.6 }, { "db": "SREASON", "id": "4879", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2009-001617", "trust": 0.8 }, { "db": "XF", "id": "2", "trust": 0.6 }, { "db": "XF", "id": "47770", "trust": 0.6 }, { "db": "XF", "id": "47771", "trust": 0.6 }, { "db": "XF", "id": "47769", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20090107 SECUNIA RESEARCH: TSC2 HELP DESK CTAB ACTIVEX CONTROL BUFFER OVERFLOW", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200901-072", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "73654", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "73653", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "73652", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "73673", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "73675", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "73676", "trust": 0.1 } ], "sources": [ { "db": "BID", "id": "33148" }, { "db": "JVNDB", "id": "JVNDB-2009-001617" }, { "db": "PACKETSTORM", "id": "73654" }, { "db": "PACKETSTORM", "id": "73653" }, { "db": "PACKETSTORM", "id": "73652" }, { "db": "PACKETSTORM", "id": "73673" }, { "db": "PACKETSTORM", "id": "73675" }, { "db": "PACKETSTORM", "id": "73676" }, { "db": "CNNVD", "id": "CNNVD-200901-072" }, { "db": "NVD", "id": "CVE-2008-4827" } ] }, "id": "VAR-200901-0399", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.33046737 }, "last_update_date": "2024-11-23T19:39:36.417000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.componentsource.co.jp/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.sap.com/" }, { "title": "Top Page", "trust": 0.8, "url": "http://www.servantix.com/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-001617" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-001617" }, { "db": "NVD", "id": "CVE-2008-4827" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "http://secunia.com/secunia_research/2008-52/" }, { "trust": 2.1, "url": "http://secunia.com/secunia_research/2008-53/" }, { "trust": 2.1, "url": "http://secunia.com/secunia_research/2008-54/" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/33148" }, { "trust": 1.6, "url": "http://securitytracker.com/id?1021529" }, { "trust": 1.6, "url": "http://securityreason.com/securityalert/4879" }, { "trust": 1.6, "url": "http://secunia.com/advisories/32672" }, { "trust": 1.6, "url": "http://secunia.com/advisories/32648" }, { "trust": 1.6, "url": "http://secunia.com/advisories/32609" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47770" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2009/0036" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47771" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/499830/100/0/threaded" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47769" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2009/0037" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4827" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-4827" }, { "trust": 0.6, "url": "http://secunia.com/advisories/business_solutions/" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/47771" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/47770" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/47769" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/499830/100/0/threaded" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2009/0037" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2009/0036" }, { "trust": 0.4, "url": "https://www.sdn.sap.com/irj/sdn/sap-gui" }, { "trust": 0.4, "url": "http://www.componentone.com/superproducts/sizerone/" }, { "trust": 0.4, "url": "http://www.tsc2-helpdesk.com/" }, { "trust": 0.3, "url": "http://support.microsoft.com/kb/240797" }, { "trust": 0.3, "url": "/archive/1/508728" }, { "trust": 0.3, "url": "/archive/1/499830" }, { "trust": 0.3, "url": "msg://bugtraq/200901071252.n07cqvck024883@ca.secunia.com" }, { "trust": 0.3, "url": "http://secunia.com/secunia_research/" }, { "trust": 0.3, "url": "http://secunia.com/corporate/jobs/" }, { "trust": 0.3, "url": "http://secunia.com/advisories/mailing_lists/" }, { "trust": 0.3, "url": "http://secunia.com/advisories/" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-4827" }, { "trust": 0.3, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.3, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.3, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.2, "url": "http://secunia.com/" }, { "trust": 0.2, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.1, "url": "http://secunia.com/advisories/product/16959/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/32672/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/product/3337/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/product/19930/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/32609/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/product/20923/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/product/20924/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/product/20925/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/product/9673/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/32648/" } ], "sources": [ { "db": "BID", "id": "33148" }, { "db": "JVNDB", "id": "JVNDB-2009-001617" }, { "db": "PACKETSTORM", "id": "73654" }, { "db": "PACKETSTORM", "id": "73653" }, { "db": "PACKETSTORM", "id": "73652" }, { "db": "PACKETSTORM", "id": "73673" }, { "db": "PACKETSTORM", "id": "73675" }, { "db": "PACKETSTORM", "id": "73676" }, { "db": "CNNVD", "id": "CNNVD-200901-072" }, { "db": "NVD", "id": "CVE-2008-4827" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "33148" }, { "db": "JVNDB", "id": "JVNDB-2009-001617" }, { "db": "PACKETSTORM", "id": "73654" }, { "db": "PACKETSTORM", "id": "73653" }, { "db": "PACKETSTORM", "id": "73652" }, { "db": "PACKETSTORM", "id": "73673" }, { "db": "PACKETSTORM", "id": "73675" }, { "db": "PACKETSTORM", "id": "73676" }, { "db": "CNNVD", "id": "CNNVD-200901-072" }, { "db": "NVD", "id": "CVE-2008-4827" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2009-01-07T00:00:00", "db": "BID", "id": "33148" }, { "date": "2009-07-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2009-001617" }, { "date": "2009-01-07T20:02:45", "db": "PACKETSTORM", "id": "73654" }, { "date": "2009-01-07T20:01:12", "db": "PACKETSTORM", "id": "73653" }, { "date": "2009-01-07T19:59:14", "db": "PACKETSTORM", "id": "73652" }, { "date": "2009-01-07T15:31:14", "db": "PACKETSTORM", "id": "73673" }, { "date": "2009-01-07T15:31:20", "db": "PACKETSTORM", "id": "73675" }, { "date": "2009-01-07T15:31:23", "db": "PACKETSTORM", "id": "73676" }, { "date": "2009-01-08T00:00:00", "db": "CNNVD", "id": "CNNVD-200901-072" }, { "date": "2009-01-08T19:30:11.063000", "db": "NVD", "id": "CVE-2008-4827" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-01-05T21:02:00", "db": "BID", "id": "33148" }, { "date": "2009-07-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2009-001617" }, { "date": "2009-01-29T00:00:00", "db": "CNNVD", "id": "CNNVD-200901-072" }, { "date": "2024-11-21T00:52:40.183000", "db": "NVD", "id": "CVE-2008-4827" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200901-072" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "AddTab Multiple heap overflow vulnerabilities in methods", "sources": [ { "db": "JVNDB", "id": "JVNDB-2009-001617" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-200901-072" } ], "trust": 0.6 } }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
componentone | sizerone | 8.0.20081.140 | |
sap | sap_gui | 6.40 | |
sap | sap_gui | 7.10 | |
sap | tabone | 7.0.0.16 | |
servantix | tsc2_help_desk | 4.18 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:componentone:sizerone:8.0.20081.140:*:*:*:*:*:*:*", "matchCriteriaId": "ED7DA0C0-8757-468F-A2C0-5E32D20F1525", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sap_gui:6.40:*:*:*:*:*:*:*", "matchCriteriaId": "5BF9DC88-FD31-4536-94E9-47A9198826B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sap_gui:7.10:*:*:*:*:*:*:*", "matchCriteriaId": "62CFD60C-5DB5-4EFD-AFBB-773F6304FC5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:tabone:7.0.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "640CE1EE-F4F6-4625-AC34-171181DDAE12", "vulnerable": true }, { "criteria": "cpe:2.3:a:servantix:tsc2_help_desk:4.18:*:*:*:*:*:*:*", "matchCriteriaId": "107B41F9-8501-4D87-9184-613EAA7FDC8B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple heap-based buffer overflows in the AddTab method in the (1) Tab and (2) CTab ActiveX controls in c1sizer.ocx and the (3) TabOne ActiveX control in sizerone.ocx in ComponentOne SizerOne 8.0.20081.140, as used in ComponentOne Studio for ActiveX 2008, TSC2 Help Desk 4.1.8, SAP GUI 6.40 Patch 29 and 7.10, and possibly other products, allow remote attackers to execute arbitrary code by adding many tabs, or adding tabs with long tab captions." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer basados en mont\u00edculo en el m\u00e9todo AddTab en los controles ActiveX (1) Tab y (2) CTab en c1sizer.ocx y control ActiveX (3) TabOne en sizerone.ocx en ComponentOne SizerOne v8.0.20081.140, como el utilizado en ComponentOne Studio para ActiveX 2008, TSC2 Help Desk 4.1.8, SAP GUI 6.40 Patch 29 y v7.10, y posiblemente otros productos, permiten a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a\u00f1adiendo muchas pesta\u00f1as, o a\u00f1adiendo pesta\u00f1as con un t\u00edtulo largo." } ], "id": "CVE-2008-4827", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-01-08T19:30:11.063", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32609" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32648" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32672" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2008-52/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2008-53/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2008-54/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://securityreason.com/securityalert/4879" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://securitytracker.com/id?1021529" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/archive/1/499830/100/0/threaded" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/bid/33148" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.vupen.com/english/advisories/2009/0036" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.vupen.com/english/advisories/2009/0037" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47769" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47770" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47771" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32609" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32648" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32672" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2008-52/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2008-53/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2008-54/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/4879" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1021529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/499830/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/33148" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/0036" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/0037" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47769" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47770" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47771" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2008-4827 (GCVE-0-2008-4827)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:31:27.857Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20090107 Secunia Research: TSC2 Help Desk CTab ActiveX Control Buffer Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/499830/100/0/threaded" }, { "name": "ADV-2009-0037", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0037" }, { "name": "ADV-2009-0036", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0036" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2008-54/" }, { "name": "sapgui-tabone-bo(47770)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47770" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2008-53/" }, { "name": "33148", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/33148" }, { "name": "sizerone-tab-bo(47771)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47771" }, { "name": "32648", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32648" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2008-52/" }, { "name": "1021529", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1021529" }, { "name": "32609", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32609" }, { "name": "4879", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/4879" }, { "name": "32672", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32672" }, { "name": "tsc2-ctab-bo(47769)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47769" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-01-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple heap-based buffer overflows in the AddTab method in the (1) Tab and (2) CTab ActiveX controls in c1sizer.ocx and the (3) TabOne ActiveX control in sizerone.ocx in ComponentOne SizerOne 8.0.20081.140, as used in ComponentOne Studio for ActiveX 2008, TSC2 Help Desk 4.1.8, SAP GUI 6.40 Patch 29 and 7.10, and possibly other products, allow remote attackers to execute arbitrary code by adding many tabs, or adding tabs with long tab captions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "name": "20090107 Secunia Research: TSC2 Help Desk CTab ActiveX Control Buffer Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/499830/100/0/threaded" }, { "name": "ADV-2009-0037", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0037" }, { "name": "ADV-2009-0036", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0036" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2008-54/" }, { "name": "sapgui-tabone-bo(47770)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47770" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2008-53/" }, { "name": "33148", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/33148" }, { "name": "sizerone-tab-bo(47771)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47771" }, { "name": "32648", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32648" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2008-52/" }, { "name": "1021529", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1021529" }, { "name": "32609", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32609" }, { "name": "4879", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/4879" }, { "name": "32672", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32672" }, { "name": "tsc2-ctab-bo(47769)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47769" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2008-4827", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple heap-based buffer overflows in the AddTab method in the (1) Tab and (2) CTab ActiveX controls in c1sizer.ocx and the (3) TabOne ActiveX control in sizerone.ocx in ComponentOne SizerOne 8.0.20081.140, as used in ComponentOne Studio for ActiveX 2008, TSC2 Help Desk 4.1.8, SAP GUI 6.40 Patch 29 and 7.10, and possibly other products, allow remote attackers to execute arbitrary code by adding many tabs, or adding tabs with long tab captions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20090107 Secunia Research: TSC2 Help Desk CTab ActiveX Control Buffer Overflow", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/499830/100/0/threaded" }, { "name": "ADV-2009-0037", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0037" }, { "name": "ADV-2009-0036", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0036" }, { "name": "http://secunia.com/secunia_research/2008-54/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2008-54/" }, { "name": "sapgui-tabone-bo(47770)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47770" }, { "name": "http://secunia.com/secunia_research/2008-53/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2008-53/" }, { "name": "33148", "refsource": "BID", "url": "http://www.securityfocus.com/bid/33148" }, { "name": "sizerone-tab-bo(47771)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47771" }, { "name": "32648", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32648" }, { "name": "http://secunia.com/secunia_research/2008-52/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2008-52/" }, { "name": "1021529", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1021529" }, { "name": "32609", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32609" }, { "name": "4879", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/4879" }, { "name": "32672", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32672" }, { "name": "tsc2-ctab-bo(47769)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47769" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2008-4827", "datePublished": "2009-01-08T19:00:00", "dateReserved": "2008-10-31T00:00:00", "dateUpdated": "2024-08-07T10:31:27.857Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }