SAP Kernel (RFC), KRNL32NUC, KRNL32UC and KRNL64NUC before versions 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64UC, before versions 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.73 and KERNEL before versions 7.21, 7.49, 7.53, 7.73, 7.76 SAP GUI for Windows (BC-FES-GUI) before versions 7.5, 7.6, and SAP GUI for Java (BC-FES-JAV) before version 7.5, allow an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service.
References
Link | Resource |
---|---|
https://launchpad.support.sap.com/#/notes/2786151 | Permissions Required Vendor Advisory |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=525962506 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2019-09-10 17:15
Updated : 2024-02-28 17:08
NVD link : CVE-2019-0365
Mitre link : CVE-2019-0365
CVE.ORG link : CVE-2019-0365
JSON object : View
Products Affected
sap
- sap_kernel_krnl32nuc
- sap_kernel_krnl64uc
- sap_kernel_krnl32uc
- sap_kernel
- sap_kernel_krnl64nuc
CWE