CVE-2008-0621

Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sap:sapgui:7.10:*:*:*:*:*:*:*
cpe:2.3:a:sap:saplpd:*:*:*:*:*:*:*:*
cpe:2.3:a:sap:sapsprint:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:42

Type Values Removed Values Added
References () http://secunia.com/advisories/28786 - Vendor Advisory () http://secunia.com/advisories/28786 - Vendor Advisory
References () http://secunia.com/advisories/28811 - () http://secunia.com/advisories/28811 -
References () http://securityreason.com/securityalert/3619 - () http://securityreason.com/securityalert/3619 -
References () http://www.securityfocus.com/archive/1/487508/100/0/threaded - () http://www.securityfocus.com/archive/1/487508/100/0/threaded -
References () http://www.securityfocus.com/archive/1/487575/100/0/threaded - () http://www.securityfocus.com/archive/1/487575/100/0/threaded -
References () http://www.securityfocus.com/bid/27613 - Exploit () http://www.securityfocus.com/bid/27613 - Exploit
References () http://www.securitytracker.com/id?1019300 - () http://www.securitytracker.com/id?1019300 -
References () http://www.vupen.com/english/advisories/2008/0409 - () http://www.vupen.com/english/advisories/2008/0409 -
References () http://www.vupen.com/english/advisories/2008/0438 - () http://www.vupen.com/english/advisories/2008/0438 -
References () https://www.exploit-db.com/exploits/5079 - () https://www.exploit-db.com/exploits/5079 -

Information

Published : 2008-02-06 12:00

Updated : 2024-11-21 00:42


NVD link : CVE-2008-0621

Mitre link : CVE-2008-0621

CVE.ORG link : CVE-2008-0621


JSON object : View

Products Affected

sap

  • saplpd
  • sapsprint
  • sapgui
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer