var-200802-0423
Vulnerability from variot
Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands. SAPlpd and SAPSprint are prone to multiple remote vulnerabilities. Very little information is currently available. We will update this BID as more information emerges. Successfully exploiting these issues allows remote attackers to crash the service and potentially to execute arbitrary code. This may facilitate the complete compromise of affected computers. The following versions are affected: - SAPlpd as included with SAP GUI 7.10 (and earlier) - Versions prior to SAPSprint 1018 This issue is reportedly documented in SAP Note 1138934.
PROVIDED AND/OR DISCOVERED BY: Originally reported in SAPLPD by Luigi Auriemma.
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched.
Download and test it today: https://psi.secunia.com/
Read more about this new version: https://psi.secunia.com/?page=changelog
TITLE: SAP GUI SAPLPD Multiple Vulnerabilities
SECUNIA ADVISORY ID: SA28786
VERIFY ADVISORY: http://secunia.com/advisories/28786/
CRITICAL: Moderately critical
IMPACT: DoS, System access
WHERE:
From local network
SOFTWARE: SAP GUI 7.x http://secunia.com/product/16959/
DESCRIPTION: Luigi Auriemma has discovered some vulnerabilities in SAP GUI, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system.
1) Multiple boundary errors exist in the SAPLPD server when processing LPD commands.
Successful exploitation may allow execution of arbitrary code.
2) An error in SAPLPD when processing the 0x53 LPD command code can be exploited to terminate an affected server. Other versions may also be affected.
SOLUTION: Restrict access to TCP port 515. The vendor will reportedly release a patch soon.
PROVIDED AND/OR DISCOVERED BY: Luigi Auriemma
ORIGINAL ADVISORY: http://aluigi.altervista.org/adv/saplpdz-adv.txt
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200802-0423", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "sapgui", "scope": "eq", "trust": 2.4, "vendor": "sap", "version": "7.10" }, { "model": "saplpd", "scope": "lte", "trust": 1.8, "vendor": "sap", "version": "6.28" }, { "model": "sapsprint", "scope": "eq", "trust": 1.0, "vendor": "sap", "version": "*" }, { "model": "saplpd", "scope": "eq", "trust": 0.9, "vendor": "sap", "version": "6.28" }, { "model": "sapsprint", "scope": "lt", "trust": 0.8, "vendor": "sap", "version": "1018" }, { "model": "sapsprint", "scope": null, "trust": 0.6, "vendor": "sap", "version": null }, { "model": "sapsprint", "scope": "eq", "trust": 0.3, "vendor": "sap", "version": "0" }, { "model": "saplpd", "scope": "eq", "trust": 0.3, "vendor": "sap", "version": "0" }, { "model": "sapsprint", "scope": "ne", "trust": 0.3, "vendor": "sap", "version": "1018" }, { "model": "gui for windows patch level", "scope": "ne", "trust": 0.3, "vendor": "sap", "version": "7.006" }, { "model": "gui for windows patch level", "scope": "ne", "trust": 0.3, "vendor": "sap", "version": "6.4030" }, { "model": "gui for windows patch level", "scope": "ne", "trust": 0.3, "vendor": "sap", "version": "6.2072" } ], "sources": [ { "db": "BID", "id": "27613" }, { "db": "JVNDB", "id": "JVNDB-2008-005442" }, { "db": "CNNVD", "id": "CNNVD-200802-088" }, { "db": "NVD", "id": "CVE-2008-0621" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:sap:sapgui", "vulnerable": true }, { "cpe22Uri": "cpe:/a:sap:saplpd", "vulnerable": true }, { "cpe22Uri": "cpe:/a:sap:sapsprint", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-005442" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Luigi Auriemma aluigi@pivx.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200802-088" } ], "trust": 0.6 }, "cve": "CVE-2008-0621", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2008-0621", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2008-0621", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2008-0621", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200802-088", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-005442" }, { "db": "CNNVD", "id": "CNNVD-200802-088" }, { "db": "NVD", "id": "CVE-2008-0621" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands. SAPlpd and SAPSprint are prone to multiple remote vulnerabilities. Very little information is currently available. We will update this BID as more information emerges. \nSuccessfully exploiting these issues allows remote attackers to crash the service and potentially to execute arbitrary code. This may facilitate the complete compromise of affected computers. \nThe following versions are affected:\n- SAPlpd as included with SAP GUI 7.10 (and earlier)\n- Versions prior to SAPSprint 1018\nThis issue is reportedly documented in SAP Note 1138934. \n\nPROVIDED AND/OR DISCOVERED BY:\nOriginally reported in SAPLPD by Luigi Auriemma. \n\n----------------------------------------------------------------------\n\nA new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI\nhas been released. The new version includes many new and advanced\nfeatures, which makes it even easier to stay patched. \n\nDownload and test it today:\nhttps://psi.secunia.com/\n\nRead more about this new version:\nhttps://psi.secunia.com/?page=changelog\n\n----------------------------------------------------------------------\n\nTITLE:\nSAP GUI SAPLPD Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA28786\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/28786/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nDoS, System access\n\nWHERE:\n\u003eFrom local network\n\nSOFTWARE:\nSAP GUI 7.x\nhttp://secunia.com/product/16959/\n\nDESCRIPTION:\nLuigi Auriemma has discovered some vulnerabilities in SAP GUI, which\ncan be exploited by malicious people to cause a DoS (Denial of\nService) or to potentially compromise a vulnerable system. \n\n1) Multiple boundary errors exist in the SAPLPD server when\nprocessing LPD commands. \n\nSuccessful exploitation may allow execution of arbitrary code. \n\n2) An error in SAPLPD when processing the 0x53 LPD command code can\nbe exploited to terminate an affected server. Other versions may also be affected. \n\nSOLUTION:\nRestrict access to TCP port 515. The vendor will reportedly release a\npatch soon. \n\nPROVIDED AND/OR DISCOVERED BY:\nLuigi Auriemma\n\nORIGINAL ADVISORY:\nhttp://aluigi.altervista.org/adv/saplpdz-adv.txt\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2008-0621" }, { "db": "JVNDB", "id": "JVNDB-2008-005442" }, { "db": "BID", "id": "27613" }, { "db": "PACKETSTORM", "id": "63373" }, { "db": "PACKETSTORM", "id": "63283" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2008-0621", "trust": 2.7 }, { "db": "BID", "id": "27613", "trust": 1.9 }, { "db": "SECUNIA", "id": "28811", "trust": 1.7 }, { "db": "SECUNIA", "id": "28786", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2008-0438", "trust": 1.6 }, { "db": "VUPEN", "id": "ADV-2008-0409", "trust": 1.6 }, { "db": "SECTRACK", "id": "1019300", "trust": 1.6 }, { "db": "EXPLOIT-DB", "id": "5079", "trust": 1.6 }, { "db": "SREASON", "id": "3619", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2008-005442", "trust": 0.8 }, { "db": "MILW0RM", "id": "5079", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20080204 MULTIPLE VULNERABILITIES IN SAPLPD 6.28", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20080205 RE: MULTIPLE VULNERABILITIES IN SAPLPD 6.28", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200802-088", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "63373", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "63283", "trust": 0.1 } ], "sources": [ { "db": "BID", "id": "27613" }, { "db": "JVNDB", "id": "JVNDB-2008-005442" }, { "db": "PACKETSTORM", "id": "63373" }, { "db": "PACKETSTORM", "id": "63283" }, { "db": "CNNVD", "id": "CNNVD-200802-088" }, { "db": "NVD", "id": "CVE-2008-0621" } ] }, "id": "VAR-200802-0423", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.25 }, "last_update_date": "2024-11-23T22:43:14.445000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SAP GUI", "trust": 0.8, "url": "http://sapdocs.info/sap/other/download-sap-gui-7-20/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-005442" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-005442" }, { "db": "NVD", "id": "CVE-2008-0621" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "http://www.securitytracker.com/id?1019300" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/27613" }, { "trust": 1.6, "url": "http://secunia.com/advisories/28786" }, { "trust": 1.6, "url": "http://securityreason.com/securityalert/3619" }, { "trust": 1.6, "url": "http://secunia.com/advisories/28811" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/487575/100/0/threaded" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2008/0438" }, { "trust": 1.0, "url": "https://www.exploit-db.com/exploits/5079" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/487508/100/0/threaded" }, { "trust": 1.0, "url": "http://www.vupen.com/english/advisories/2008/0409" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0621" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-0621" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/487575/100/0/threaded" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/487508/100/0/threaded" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/0409" }, { "trust": 0.6, "url": "http://www.milw0rm.com/exploits/5079" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/0438" }, { "trust": 0.3, "url": "/archive/1/487508" }, { "trust": 0.3, "url": "/archive/1/487575" }, { "trust": 0.2, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.2, "url": "http://secunia.com/advisories/28786/" }, { "trust": 0.2, "url": "https://psi.secunia.com/?page=changelog" }, { "trust": 0.2, "url": "https://psi.secunia.com/" }, { "trust": 0.2, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.2, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/28811/" }, { "trust": 0.1, "url": "http://secunia.com/product/17480/" }, { "trust": 0.1, "url": "http://secunia.com/product/16959/" }, { "trust": 0.1, "url": "http://aluigi.altervista.org/adv/saplpdz-adv.txt" } ], "sources": [ { "db": "BID", "id": "27613" }, { "db": "JVNDB", "id": "JVNDB-2008-005442" }, { "db": "PACKETSTORM", "id": "63373" }, { "db": "PACKETSTORM", "id": "63283" }, { "db": "CNNVD", "id": "CNNVD-200802-088" }, { "db": "NVD", "id": "CVE-2008-0621" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "27613" }, { "db": "JVNDB", "id": "JVNDB-2008-005442" }, { "db": "PACKETSTORM", "id": "63373" }, { "db": "PACKETSTORM", "id": "63283" }, { "db": "CNNVD", "id": "CNNVD-200802-088" }, { "db": "NVD", "id": "CVE-2008-0621" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-02-04T00:00:00", "db": "BID", "id": "27613" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-005442" }, { "date": "2008-02-08T01:19:15", "db": "PACKETSTORM", "id": "63373" }, { "date": "2008-02-05T23:02:25", "db": "PACKETSTORM", "id": "63283" }, { "date": "2008-02-06T00:00:00", "db": "CNNVD", "id": "CNNVD-200802-088" }, { "date": "2008-02-06T12:00:00", "db": "NVD", "id": "CVE-2008-0621" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-07-05T22:00:00", "db": "BID", "id": "27613" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-005442" }, { "date": "2008-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-200802-088" }, { "date": "2024-11-21T00:42:31.793000", "db": "NVD", "id": "CVE-2008-0621" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200802-088" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SAP GUI and SAPSprint include SAPLPD Vulnerable to buffer overflow", "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-005442" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-200802-088" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.