2017-12-15 05:03:06 -05:00
{
2019-03-17 23:27:28 +00:00
"CVE_data_meta" : {
"ASSIGNER" : "cna@sap.com" ,
"ID" : "CVE-2018-2465" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "SAP HANA" ,
"version" : {
"version_data" : [
{
"version_name" : "=" ,
"version_value" : "1.0"
} ,
{
"version_name" : "=" ,
"version_value" : "2.0"
}
]
}
}
]
} ,
"vendor_name" : "SAP"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
2018-09-11 10:15:43 -04:00
{
2019-03-17 23:27:28 +00:00
"lang" : "eng" ,
"value" : "SAP HANA (versions 1.0 and 2.0) Extended Application Services classic model OData parser does not sufficiently validate XML. By exploiting, an unauthorized hacker can cause the database server to crash."
2018-09-11 10:15:43 -04:00
}
2019-03-17 23:27:28 +00:00
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "Denial of Service"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "105324" ,
"refsource" : "BID" ,
"url" : "http://www.securityfocus.com/bid/105324"
} ,
{
"name" : "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993" ,
"refsource" : "CONFIRM" ,
"url" : "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993"
} ,
{
"name" : "https://launchpad.support.sap.com/#/notes/2681207" ,
"refsource" : "MISC" ,
"url" : "https://launchpad.support.sap.com/#/notes/2681207"
}
]
} ,
"source" : {
"discovery" : "UNKNOWN"
}
}