ID
VAR-201506-0584
TITLE
SAP GUI Remote Buffer Overflow Vulnerability
Trust: 0.3
sources:
BID: 75169
DESCRIPTION
SAP GUI is prone to a remote buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed exploit attempts may result in a denial-of-service condition.
Trust: 0.3
sources:
BID: 75169
AFFECTED PRODUCTS
| vendor: | sap | model: | gui | scope: | eq | version: | 0 | Trust: 0.3 |
sources:
BID: 75169
THREAT TYPE
network
Trust: 0.3
sources:
BID: 75169
TYPE
Boundary Condition Error
Trust: 0.3
sources:
BID: 75169
EXTERNAL IDS
| db: | BID | id: | 75169 | Trust: 0.3 |
sources:
BID: 75169
REFERENCES
| url: | https://service.sap.com/sap/support/notes/2151237 | Trust: 0.3 |
| url: | http://www.sap.com | Trust: 0.3 |
| url: | http://seclists.org/fulldisclosure/2015/jun/33 | Trust: 0.3 |
sources:
BID: 75169
CREDITS
Darya Maenkova (ERPScan)
Trust: 0.3
sources:
BID: 75169
SOURCES
| db: | BID | id: | 75169 |
LAST UPDATE DATE
2022-05-17T02:01:10.432000+00:00
SOURCES UPDATE DATE
| db: | BID | id: | 75169 | date: | 2015-06-11T00:00:00 |
SOURCES RELEASE DATE
| db: | BID | id: | 75169 | date: | 2015-06-11T00:00:00 |