CVE-2018-2433

SAP Gateway (SAP KERNEL 32 NUC, SAP KERNEL 32 Unicode, SAP KERNEL 64 NUC, SAP KERNEL 64 Unicode 7.21, 7.21EXT, 7.22 and 7.22EXT; SAP KERNEL 7.21, 7.22, 7.45, 7.49 and 7.53) allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sap:sap_kernel:7.21:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_kernel:7.21ext:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_kernel:7.22:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_kernel:7.22ext:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_kernel:7.45:*:*:*:*:*:*:*
cpe:2.3:a:sap:sap_kernel:7.49:*:*:*:*:*:*:*
cpe:2.3:o:sap:sap_kernel:7.53:*:*:*:*:*:*:*

History

21 Nov 2024, 04:03

Type Values Removed Values Added
References () https://launchpad.support.sap.com/#/notes/2597913 - Permissions Required, Vendor Advisory () https://launchpad.support.sap.com/#/notes/2597913 - Permissions Required, Vendor Advisory
References () https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=497256000 - Vendor Advisory () https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=497256000 - Vendor Advisory

Information

Published : 2018-07-10 18:29

Updated : 2024-11-21 04:03


NVD link : CVE-2018-2433

Mitre link : CVE-2018-2433

CVE.ORG link : CVE-2018-2433


JSON object : View

Products Affected

sap

  • sap_kernel