cvelist/2018/2xxx/CVE-2018-2369.json

78 lines
2.4 KiB
JSON
Raw Normal View History

2017-12-15 05:03:06 -05:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cna@sap.com",
2017-12-15 05:03:06 -05:00
"ID" : "CVE-2018-2369",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "SAP HANA",
"version" : {
"version_data" : [
{
"version_affected" : "=",
"version_value" : "1.00"
},
{
"version_affected" : "=",
"version_value" : "2.00"
}
]
}
}
]
},
"vendor_name" : "SAP SE"
}
]
}
2017-12-15 05:03:06 -05:00
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Under certain conditions SAP HANA, 1.00, 2.00, allows an unauthenticated attacker to access information which would otherwise be restricted. An attacker can misuse the authentication function of the SAP HANA server on its SQL interface and disclose 8 bytes of the server process memory. The attacker cannot influence or predict the location of the leaked memory."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Information Disclosure"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/",
"refsource" : "CONFIRM",
"url" : "https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/"
},
{
"name" : "https://launchpad.support.sap.com/#/notes/2572940",
"refsource" : "CONFIRM",
"url" : "https://launchpad.support.sap.com/#/notes/2572940"
2018-02-15 06:04:25 -05:00
},
{
"name" : "102997",
"refsource" : "BID",
2018-02-15 06:04:25 -05:00
"url" : "http://www.securityfocus.com/bid/102997"
2017-12-15 05:03:06 -05:00
}
]
}
}