cvelist/2019/0xxx/CVE-2019-0365.json

214 lines
9.8 KiB
JSON
Raw Normal View History

2018-11-26 08:03:09 -05:00
{
2019-09-10 17:00:59 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
2019-03-18 03:10:56 +00:00
"CVE_data_meta": {
"ID": "CVE-2019-0365",
2019-09-10 17:00:59 +00:00
"ASSIGNER": "cna@sap.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SAP SE",
"product": {
"product_data": [
{
"product_name": "SAP Kernel (KRNL32NUC)",
"version": {
"version_data": [
{
"version_name": "<",
"version_value": "7.21"
},
{
"version_name": "<",
"version_value": "7.21EXT"
},
{
"version_name": "<",
"version_value": "7.22"
},
{
"version_name": "<",
"version_value": "7.22EXT"
}
]
}
},
{
"product_name": "SAP Kernel (KRNL32UC)",
"version": {
"version_data": [
{
"version_name": "<",
"version_value": "7.21"
},
{
"version_name": "<",
"version_value": "7.21EXT"
},
{
"version_name": "<",
"version_value": "7.22"
},
{
"version_name": "<",
"version_value": "7.22EXT"
}
]
}
},
{
"product_name": "SAP Kernel (KRNL64NUC)",
"version": {
"version_data": [
{
"version_name": "<",
"version_value": "7.21"
},
{
"version_name": "<",
"version_value": "7.21EXT"
},
{
"version_name": "<",
"version_value": "7.22"
},
{
"version_name": "<",
"version_value": "7.22EXT"
},
{
"version_name": "<",
"version_value": "7.49"
}
]
}
},
{
"product_name": "SAP Kernel (KRNL64UC)",
"version": {
"version_data": [
{
"version_name": "<",
"version_value": "7.21"
},
{
"version_name": "<",
"version_value": "7.21EXT"
},
{
"version_name": "<",
"version_value": "7.22"
},
{
"version_name": "<",
"version_value": "7.22EXT"
},
{
"version_name": "<",
"version_value": "7.49"
},
{
"version_name": "<",
"version_value": "7.73"
}
]
}
},
{
"product_name": "SAP Kernel (KERNEL)",
"version": {
"version_data": [
{
"version_name": "<",
"version_value": "7.21"
},
{
"version_name": "<",
"version_value": "7.49"
},
{
"version_name": "<",
"version_value": "7.53"
},
{
"version_name": "<",
"version_value": "7.73"
},
{
"version_name": "<",
"version_value": "7.76"
}
]
}
},
{
"product_name": "SAP GUI for Windows (BC-FES-GUI)",
"version": {
"version_data": [
{
"version_name": "<",
"version_value": "7.5"
},
{
"version_name": "<",
"version_value": "7.6"
}
]
}
},
{
"product_name": "SAP GUI for Java (BC-FES-JAV)",
"version": {
"version_data": [
{
"version_name": "<",
"version_value": "7.5"
}
]
}
}
]
}
}
]
}
2019-03-18 03:10:56 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2019-09-10 17:00:59 +00:00
"value": "SAP Kernel (RFC), KRNL32NUC, KRNL32UC and KRNL64NUC before versions 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64UC, before versions 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.73 and KERNEL before versions 7.21, 7.49, 7.53, 7.73, 7.76 SAP GUI for Windows (BC-FES-GUI) before versions 7.5, 7.6, and SAP GUI for Java (BC-FES-JAV) before version 7.5, allow an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of Service"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=525962506",
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=525962506"
},
{
"url": "https://launchpad.support.sap.com/#/notes/2786151",
"refsource": "MISC",
"name": "https://launchpad.support.sap.com/#/notes/2786151"
2019-03-18 03:10:56 +00:00
}
]
}
}