Vulnerability Name: | CCN-50977 | ||||||
Published: | 2009-06-08 | ||||||
Updated: | 2009-06-08 | ||||||
Summary: | SAP AG SAPgui (sapirrfc.dll) is vulnerable to a buffer overflow. By persuading a victim to visit a specially-crafted Web page that passes an overly long string to the Accept() method, a remote attacker could overflow a buffer and execute arbitrary code on the system with the privileges of the victim or cause the victim's browser to crash. | ||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||
CVSS v2 Severity: | 9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 7.7 High (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
| ||||||
Vulnerability Consequences: | Gain Access | ||||||
References: | Source: CCN Type: DSECRG-09-015 SAP GUI 6.4 Buffer Overflow vulnerability Source: CCN Type: BID-35256 SAP AG SAPgui 'sapirrfc.dll' ActiveX Control Buffer Overflow Vulnerability Source: XF Type: UNKNOWN sapgui-sapirrfc-activex-bo(50977) | ||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
BACK |