CVE-2017-6950
https://notcve.org/view.php?id=CVE-2017-6950
SAP GUI 7.2 through 7.5 allows remote attackers to bypass intended security policy restrictions and execute arbitrary code via a crafted ABAP code, aka SAP Security Note 2407616. SAP GUI 7.2 hasta la versión 7.5 permite a atacantes remotos eludir las restricciones de política de seguridad previstas y ejecutar código arbitrario a través de un código ABAP manipulado, vulnerabilidad también conocida como SAP Security Note 2407616. • http://www.securityfocus.com/bid/96872 http://www.securitytracker.com/id/1038122 https://erpscan.io/advisories/erpscan-17-011-sap-gui-versions-remote-code-execution-bypass-security-policy • CWE-732: Incorrect Permission Assignment for Critical Resource •
CVE-2015-2282
https://notcve.org/view.php?id=CVE-2015-2282
Stack-based buffer overflow in the LZC decompression implementation (CsObjectInt::CsDecomprLZC function in vpa106cslzc.cpp) in SAP MaxDB 7.5 and 7.6, Netweaver Application Server ABAP, Netweaver Application Server Java, Netweaver RFC SDK, GUI, RFC SDK, SAPCAR archive tool, and other products allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors, aka SAP Security Note 2124806, 2121661, 2127995, and 2125316. Desbordamiento de buffer basado en pila en la implementación LZC decompression (la función CsObjectInt::CsDecomprLZC en vpa106cslzc.cpp) en SAP MaxDB 7.5 y 7.6, Netweaver Application Server ABAP, Netweaver Application Server Java, Netweaver RFC SDK, GUI, RFC SDK, la herramienta de archivos SAPCAR, y otros productos permite a atacantes dependientes de contexto causar una denegación de servicio (caída) o posiblemente ejecutar código arbitrario a través de vectores no especificados, también conocido como las notas de seguridad de 2124806, 2121661, 2127995, y 2125316. • http://packetstormsecurity.com/files/131883/SAP-LZC-LZH-Compression-Denial-Of-Service.html http://seclists.org/fulldisclosure/2015/May/50 http://seclists.org/fulldisclosure/2015/May/96 http://www.coresecurity.com/advisories/sap-lzc-lzh-compression-multiple-vulnerabilities http://www.securityfocus.com/archive/1/535535/100/0/threaded http://www.securityfocus.com/bid/74643 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2015-2278
https://notcve.org/view.php?id=CVE-2015-2278
The LZH decompression implementation (CsObjectInt::BuildHufTree function in vpa108csulzh.cpp) in SAP MaxDB 7.5 and 7.6, Netweaver Application Server ABAP, Netweaver Application Server Java, Netweaver RFC SDK, GUI, RFC SDK, SAPCAR archive tool, and other products allows context-dependent attackers to cause a denial of service (out-of-bounds read) via unspecified vectors, related to look-ups of non-simple codes, aka SAP Security Note 2124806, 2121661, 2127995, and 2125316. La implementación LZH decompression (la función CsObjectInt::BuildHufTree en vpa108csulzh.cpp) en SAP MaxDB 7.5 and 7.6, Netweaver Application Server ABAP, Netweaver Application Server Java, Netweaver RFC SDK, GUI, RFC SDK, la herramienta de archivos SAPCAR, y otros productos permite a atacantes dependientes de contexto causar una denegación de servicio (lectura fuera de rango) a través de vectores no especificados, relacionado con búsquedas de códigos no simples, también conocido como las notas de seguridad de SAP 2124806, 2121661, 2127995, y 2125316. • http://packetstormsecurity.com/files/131883/SAP-LZC-LZH-Compression-Denial-Of-Service.html http://seclists.org/fulldisclosure/2015/May/50 http://seclists.org/fulldisclosure/2015/May/96 http://www.coresecurity.com/advisories/sap-lzc-lzh-compression-multiple-vulnerabilities http://www.securityfocus.com/archive/1/535535/100/0/threaded http://www.securityfocus.com/bid/74643 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2008-4830 – EnjoySAP SAP GUI - ActiveX Control Arbitrary File Download
https://notcve.org/view.php?id=CVE-2008-4830
Insecure method vulnerability in the KWEdit ActiveX control in SAP GUI 6.40 Patch 29 (KWEDIT.DLL 6400.1.1.41) and 7.10 Patch 5 (KWEDIT.DLL 7100.1.1.43) allows remote attackers to (1) overwrite arbitrary files via the SaveDocumentAs method or (2) read or execute arbitrary files via the OpenDocument method. Vulnerabilidad de método inseguro en el control ActiveX KWEdit en SAP GUI v6.40 Patch 29 (KWEDIT.DLL v6400.1.1.41) y v7.10 Patch 5 (KWEDIT.DLL v7100.1.1.43) permite a atacantes remotos (1) sobreescribir ficheros de su elección mediante el método SaveDocumentAs o (2) leer y ejecutar ficheros de su elección mediante el método OpenDocument. • https://www.exploit-db.com/exploits/16493 http://secunia.com/advisories/32869 http://secunia.com/secunia_research/2008-56 http://www.securityfocus.com/archive/1/502698/100/0/threaded http://www.securityfocus.com/bid/34524 http://www.securitytracker.com/id?1022062 http://www.vupen.com/english/advisories/2009/1043 •
CVE-2008-4827
https://notcve.org/view.php?id=CVE-2008-4827
Multiple heap-based buffer overflows in the AddTab method in the (1) Tab and (2) CTab ActiveX controls in c1sizer.ocx and the (3) TabOne ActiveX control in sizerone.ocx in ComponentOne SizerOne 8.0.20081.140, as used in ComponentOne Studio for ActiveX 2008, TSC2 Help Desk 4.1.8, SAP GUI 6.40 Patch 29 and 7.10, and possibly other products, allow remote attackers to execute arbitrary code by adding many tabs, or adding tabs with long tab captions. Múltiples desbordamientos de búfer basados en montículo en el método AddTab en los controles ActiveX (1) Tab y (2) CTab en c1sizer.ocx y control ActiveX (3) TabOne en sizerone.ocx en ComponentOne SizerOne v8.0.20081.140, como el utilizado en ComponentOne Studio para ActiveX 2008, TSC2 Help Desk 4.1.8, SAP GUI 6.40 Patch 29 y v7.10, y posiblemente otros productos, permiten a atacantes remotos ejecutar código de su elección añadiendo muchas pestañas, o añadiendo pestañas con un título largo. • http://secunia.com/advisories/32609 http://secunia.com/advisories/32648 http://secunia.com/advisories/32672 http://secunia.com/secunia_research/2008-52 http://secunia.com/secunia_research/2008-53 http://secunia.com/secunia_research/2008-54 http://securityreason.com/securityalert/4879 http://securitytracker.com/id?1021529 http://www.securityfocus.com/archive/1/499830/100/0/threaded http://www.securityfocus.com/bid/33148 http://www.vupen.com/english/advisories/2009/0036 http:& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •