ID
VAR-201506-0584
TITLE
SAP GUI Remote Buffer Overflow Vulnerability
Trust: 0.3
sources:
BID: 75169
DESCRIPTION
SAP GUI is prone to a remote buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed exploit attempts may result in a denial-of-service condition.
Trust: 0.3
sources:
BID: 75169
AFFECTED PRODUCTS
vendor: | sap | model: | gui | scope: | eq | version: | 0 | Trust: 0.3 |
sources:
BID: 75169
THREAT TYPE
network
Trust: 0.3
sources:
BID: 75169
TYPE
Boundary Condition Error
Trust: 0.3
sources:
BID: 75169
EXTERNAL IDS
db: | BID | id: | 75169 | Trust: 0.3 |
sources:
BID: 75169
REFERENCES
url: | https://service.sap.com/sap/support/notes/2151237 | Trust: 0.3 |
url: | http://www.sap.com | Trust: 0.3 |
url: | http://seclists.org/fulldisclosure/2015/jun/33 | Trust: 0.3 |
sources:
BID: 75169
CREDITS
Darya Maenkova (ERPScan)
Trust: 0.3
sources:
BID: 75169
SOURCES
db: | BID | id: | 75169 |
LAST UPDATE DATE
2022-05-17T02:01:10.432000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 75169 | date: | 2015-06-11T00:00:00 |
SOURCES RELEASE DATE
db: | BID | id: | 75169 | date: | 2015-06-11T00:00:00 |