Short Name |
LPD:OPT-OF |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
LPD |
Keywords |
Option Overflow |
Release Date |
2008/08/13 |
Update Number |
1252 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in the multiple LPD instance including SAPlpd, iPrint and SAPSprint. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.
SAPlpd and SAPSprint are prone to multiple remote vulnerabilities. Very little information is currently available. We will update this BID as more information emerges. Successfully exploiting these issues allows remote attackers to crash the service and potentially to execute arbitrary code. This may facilitate the complete compromise of affected computers. The following versions are affected: - SAPlpd as included with SAP GUI 7.10 (and earlier) - Versions prior to SAPSprint 1018 This issue is reportedly documented in SAP Note 1138934.