7.5
CVSSv2

CVE-2008-0621

Published: 06/02/2008 Updated: 15/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 760
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in SAPLPD 6.28 and previous versions included in SAP GUI 7.10 and SAPSprint prior to 1018 allows remote malicious users to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands.

Vulnerable Product Search on Vulmon Subscribe to Product

sap sapsprint

sap saplpd

sap sapgui 7.10

Exploits

## # $Id: saplpdrb 9262 2010-05-09 17:45:00Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metasploi ...
/* listsgrokorguk/pipermail/full-disclosure/2008-February/060042html Exploit for SapLPD 628 Win32 by BackBone Tested with SapLPD 628 on Windows XP SP2 Groetjes aan mijn sletjes Ops,Doop,Gabber,head,ps,sj,dd en de rest! */ #include <stdioh> #include <winsock2h> #include <windowsh> #pragma comment (lib,"ws2_32 ...