vendor:
SAPlpd
by:
MC
N/A
CVSS
N/A
Buffer Overflow
119
CWE
Product Name: SAPlpd
Affected Version From: SAPlpd 6.28.0.1 (SAP Release 6.40)
Affected Version To: SAPlpd 6.28.0.1 (SAP Release 6.40)
Patch Exists: NO
Related CWE: CVE-2008-0621, OSVDB-41127, BID-27613
CPE: SAPlpd
Metasploit:
N/A
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=31121, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/windows/lpd/saplpd, https://www.infosecmatter.com/list-of-metasploit-windows-exploits-detailed-spreadsheet/, https://www.infosecmatter.com/nessus-plugin-library/?id=132862, https://www.infosecmatter.com/nessus-plugin-library/?id=132859, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/windows/lpd/saplpd, https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/windows/lpd/saplpd
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2008
SAP SAPLPD 6.28 Buffer Overflow
This module exploits a stack buffer overflow in SAPlpd 6.28 (SAP Release 6.40). By sending an overly long argument, an attacker may be able to execute arbitrary code.
Mitigation:
No known mitigation or remediation for this vulnerability