SAP GUI saplogon.ini File Buffer Overflow (Note 1504547)

This script is Copyright (C) 2011-2014 Tenable Network Security, Inc.


Synopsis :

The remote application is susceptible to a buffer overflow.

Description :

The remote host is running a version of SAP GUI that is reportedly
affected by a buffer overflow vulnerability. By convincing a user to
open a specially crafted 'saplogon.ini' file, an attacker may be able
to execute arbitrary code with the credentials of the user.

See also :

http://dsecrg.com/pages/vul/show.php?id=317
https://service.sap.com/sap/support/notes/1504547

Solution :

Upgrade to SAP GUI version 7.10 SP21 / 7.20 SP3 or higher.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.9
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 55651 ()

Bugtraq ID: 47359

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now