Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/28786 - Vendor Advisory | |
References | () http://secunia.com/advisories/28811 - | |
References | () http://securityreason.com/securityalert/3619 - | |
References | () http://www.securityfocus.com/archive/1/487508/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/487575/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/27613 - Exploit | |
References | () http://www.securitytracker.com/id?1019300 - | |
References | () http://www.vupen.com/english/advisories/2008/0409 - | |
References | () http://www.vupen.com/english/advisories/2008/0438 - | |
References | () https://www.exploit-db.com/exploits/5079 - |
Information
Published : 2008-02-06 12:00
Updated : 2024-11-21 00:42
NVD link : CVE-2008-0621
Mitre link : CVE-2008-0621
CVE.ORG link : CVE-2008-0621
JSON object : View
Products Affected
sap
- saplpd
- sapsprint
- sapgui
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer