LPD: Option Overflow

This signature detects attempts to exploit a known vulnerability in the multiple LPD instance including SAPlpd, iPrint and SAPSprint. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Extended Description

SAPlpd and SAPSprint are prone to multiple remote vulnerabilities. Very little information is currently available. We will update this BID as more information emerges. Successfully exploiting these issues allows remote attackers to crash the service and potentially to execute arbitrary code. This may facilitate the complete compromise of affected computers. The following versions are affected: - SAPlpd as included with SAP GUI 7.10 (and earlier) - Versions prior to SAPSprint 1018 This issue is reportedly documented in SAP Note 1138934.

Affected Products

Sap sapsprint,Sap saplpd

References

BugTraq: 46309 27613

CVE: CVE-2010-4328

Short Name
LPD:OPT-OF
Severity
Major
Recommended
False
Recommended Action
Drop
Category
LPD
Keywords
CVE-2010-4328 Option Overflow bid:27613 bid:46309
Release Date
08/13/2008
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
Port
TCP/515
False Positive
Unknown
Vendors

Sap

CVSS Score

7.5

Found a potential security threat?