CVE-2008-0621
Sapgui < 6.28 - Memory Corruption
Title source: ruleDescription
Buffer overflow in SAPLPD 6.28 and earlier included in SAP GUI 7.10 and SAPSprint before 1018 allows remote attackers to execute arbitrary code via long arguments to the (1) 0x01, (2) 0x02, (3) 0x03, (4) 0x04, and (5) 0x05 LPD commands.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16338
exploitdb
WORKING POC
VERIFIED
by BackBone · cremotewindows_x86
https://www.exploit-db.com/exploits/5079
metasploit
WORKING POC
GOOD
rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/lpd/saplpd.rb
References (10)
Scores
EPSS
0.8800
EPSS Percentile
99.5%
Details
CWE
CWE-119
Status
published
Products (3)
sap/sapgui
7.10
sap/saplpd
< 6.28
sap/sapsprint
Published
Feb 06, 2008
Tracked Since
Feb 18, 2026