CVE-2008-0621

Sapgui < 6.28 - Memory Corruption

Title source: rule

Description

Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16338
exploitdb WORKING POC VERIFIED
by BackBone · cremotewindows_x86
https://www.exploit-db.com/exploits/5079
metasploit WORKING POC GOOD
rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/lpd/saplpd.rb

Scores

EPSS 0.8800
EPSS Percentile 99.5%

Details

CWE
CWE-119
Status published
Products (3)
sap/sapgui 7.10
sap/saplpd < 6.28
sap/sapsprint
Published Feb 06, 2008
Tracked Since Feb 18, 2026