2024-11-22 11:14:00 +00:00

163 lines
5.2 KiB
JSON

{
"id": "CVE-2009-4603",
"sourceIdentifier": "cve@mitre.org",
"published": "2010-01-12T17:30:01.197",
"lastModified": "2024-11-21T01:10:01.607",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in sapstartsrv.exe in the SAP Kernel 6.40, 7.00, 7.01, 7.10, 7.11, and 7.20, as used in SAP NetWeaver 7.x and SAP Web Application Server 6.x and 7.x, allows remote attackers to cause a denial of service (Management Console shutdown) via a crafted request. NOTE: some of these details are obtained from third party information."
},
{
"lang": "es",
"value": "vulnerabilidad inespec\u00edfica en sapstartsrv.exe en el kernel SAP v6.40, v7.00, v7.01, v7.10, v7.11, y v7.20, tal y como se utiliza en SAP NetWeaver v7.x y SAP Web Application Server v6.x y v7.x, permite a atacantes remotos producir una denegaci\u00f3n de servicio (apagado de la consola de administraci\u00f3n) a trav\u00e9s de una petici\u00f3n manipulada."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:sap_kernel:6.40:*:*:*:*:*:*:*",
"matchCriteriaId": "548D937D-FF7F-4B5B-98A2-50F5FBA7875D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:sap_kernel:7.00:*:*:*:*:*:*:*",
"matchCriteriaId": "DA732B51-EF58-41D1-A012-195847AE9CC1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:sap_kernel:7.01:*:*:*:*:*:*:*",
"matchCriteriaId": "78E8D3B9-CAF2-47FD-93C7-CCF6554BBA49"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:sap_kernel:7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "9B8965F9-F10A-4F6A-830C-7D5D4596AA26"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:sap_kernel:7.11:*:*:*:*:*:*:*",
"matchCriteriaId": "B09614D3-0B53-48FC-9E1F-05384AEFBE57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:sap_kernel:7.20:*:*:*:*:*:*:*",
"matchCriteriaId": "633CC2AD-4B48-4473-A818-93E40DCBEFBE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:sap:sap_netweaver:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "813CC383-4123-45B0-A58A-78A8DC71FFE7"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:a:sap:sap_web_application_server:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FC17AFFF-324D-40F5-9305-1A049E16B7A3"
}
]
}
]
}
],
"references": [
{
"url": "http://secunia.com/advisories/37684",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cybsec.com/vuln/CYBSEC_SAP_sapstartsrv_DoS.pdf",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/37286",
"source": "cve@mitre.org"
},
{
"url": "http://www.securitytracker.com/id?1023319",
"source": "cve@mitre.org"
},
{
"url": "https://service.sap.com/sap/support/notes/1302231",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/37684",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.cybsec.com/vuln/CYBSEC_SAP_sapstartsrv_DoS.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/37286",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securitytracker.com/id?1023319",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://service.sap.com/sap/support/notes/1302231",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}