Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wjhh-pcvh-43xr

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Integer overflow in the OBGIOPServerWorker::extractHeader function in the ebus-3-3-2-6.dll module in SAP Crystal Reports 2008 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a GIOP packet with a crafted size, which triggers a heap-based buffer overflow.

Integer overflow in the OBGIOPServerWorker::extractHeader function in the ebus-3-3-2-6.dll module in SAP Crystal Reports 2008 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a GIOP packet with a crafted size, which triggers a heap-based buffer overflow.

EPSS

Процентиль: 96%
0.25557
Средний

Связанные уязвимости

nvd
больше 15 лет назад

Integer overflow in the OBGIOPServerWorker::extractHeader function in the ebus-3-3-2-6.dll module in SAP Crystal Reports 2008 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a GIOP packet with a crafted size, which triggers a heap-based buffer overflow.

EPSS

Процентиль: 96%
0.25557
Средний