ID

VAR-E-200906-0699


TITLE

SAP AG SAPgui 'sapirrfc.dll' ActiveX Control Buffer Overflow Vulnerability

Trust: 0.3

sources: BID: 35256

DESCRIPTION

SAP AG SAPgui is prone to a remote buffer-overflow vulnerability.
Attackers can exploit this issue to execute arbitrary code within the context of an application that uses the ActiveX control (typically Internet Explorer). Failed exploit attempts will result in a denial-of-service condition.
SAPgui 6.4 is vulnerable; other versions may also be affected.

Trust: 0.3

sources: BID: 35256

AFFECTED PRODUCTS

vendor:sapmodel:ag sapguiscope:eqversion:6.4

Trust: 0.3

sources: BID: 35256

EXPLOIT

A working commercial exploit is available through VUPEN Security - Exploit and PoCs Service. This exploit is not otherwise publicly available or known to be circulating in the wild.
The following proof of concept and exploit are available:
Bullet list:
<li><a href="/data/vulnerabilities/exploits/35256.html">/data/vulnerabilities/exploits/35256.html</a></li>
<li><a href="/data/vulnerabilities/exploits/35256-2.html">/data/vulnerabilities/exploits/35256-2.html</a></li>

Trust: 0.3

sources: BID: 35256

PRICE

Free

Trust: 0.3

sources: BID: 35256

TYPE

Boundary Condition Error

Trust: 0.3

sources: BID: 35256

CREDITS

Alexander Polyakov

Trust: 0.3

sources: BID: 35256

EXTERNAL IDS

db:BIDid:35256

Trust: 0.3

sources: BID: 35256

REFERENCES

url:http://support.microsoft.com/kb/240797

Trust: 0.3

url:https://service.sap.com/sap/support/notes/1286637

Trust: 0.3

url:http://www.sap.com

Trust: 0.3

sources: BID: 35256

SOURCES

db:BIDid:35256

LAST UPDATE DATE

2022-07-27T09:28:21.020000+00:00


SOURCES UPDATE DATE

db:BIDid:35256date:2009-12-14T23:43:00

SOURCES RELEASE DATE

db:BIDid:35256date:2009-06-08T00:00:00