vendor:
SAP GUI for Windows
by:
Abysssec
9.8
CVSS
CRITICAL
Buffer Overflow
120
CWE
Product Name: SAP GUI for Windows
Affected Version From: 7.2
Affected Version To: 7.2
Patch Exists: YES
Related CWE: CVE-2009-0948
CPE: a:sap:sap_gui_for_windows:7.20
Metasploit:
N/A
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=99242, https://www.infosecmatter.com/nessus-plugin-library/?id=89454, https://www.infosecmatter.com/nessus-plugin-library/?id=101974, https://www.infosecmatter.com/nessus-plugin-library/?id=99578, https://www.infosecmatter.com/nessus-plugin-library/?id=87966
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2009
SAP GUI for Windows sapirrfc.dll (Accecpt) Activex Overflow
This exploit is a buffer overflow vulnerability in the SAP GUI for Windows sapirrfc.dll ActiveX control. The vulnerability is triggered when a specially crafted Accept() method is called with a large string. This causes a stack-based buffer overflow, which can be used to execute arbitrary code.
Mitigation:
The vendor has released a patch to address this vulnerability.