SAP GUI saplogon.ini File Buffer Overflow (Note 1504547)

This script is Copyright (C) 2011-2014 Tenable Network Security, Inc.

Synopsis :

The remote application is susceptible to a buffer overflow.

Description :

The remote host is running a version of SAP GUI that is reportedly
affected by a buffer overflow vulnerability. By convincing a user to
open a specially crafted 'saplogon.ini' file, an attacker may be able
to execute arbitrary code with the credentials of the user.

See also :

Solution :

Upgrade to SAP GUI version 7.10 SP21 / 7.20 SP3 or higher.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 6.9
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 55651 ()

Bugtraq ID: 47359


Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now