First published: Wed Feb 06 2008(Updated: )
Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SAP SAPgui | =7.10 | |
SAP SAPLPD | <=6.28 | |
Sap Sapsprint |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0621 is categorized as a high severity vulnerability due to its potential to allow remote code execution.
To mitigate CVE-2008-0621, users should upgrade to SAPLPD version 6.29 or later and SAP GUI version 7.10 EHP1 or newer.
CVE-2008-0621 affects SAPLPD versions up to 6.28 and SAP GUI version 7.10.
CVE-2008-0621 can be exploited via a buffer overflow caused by long arguments in specific LPD commands.
Organizations using the affected versions of SAP software are at risk of exploitation from remote attackers.