SAP Kernel (RFC), KRNL32NUC, KRNL32UC and KRNL64NUC before versions 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64UC, before versions 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.73 and KERNEL before versions 7.21, 7.49, 7.53, 7.73, 7.76 SAP GUI for Windows (BC-FES-GUI) before versions 7.5, 7.6, and SAP GUI for Java (BC-FES-JAV) before version 7.5, allow an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service.
References
Link | Resource |
---|---|
https://launchpad.support.sap.com/#/notes/2786151 | Permissions Required Vendor Advisory |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=525962506 | Vendor Advisory |
https://launchpad.support.sap.com/#/notes/2786151 | Permissions Required Vendor Advisory |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=525962506 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://launchpad.support.sap.com/#/notes/2786151 - Permissions Required, Vendor Advisory | |
References | () https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=525962506 - Vendor Advisory |
Information
Published : 2019-09-10 17:15
Updated : 2024-11-21 04:16
NVD link : CVE-2019-0365
Mitre link : CVE-2019-0365
CVE.ORG link : CVE-2019-0365
JSON object : View
Products Affected
sap
- sap_kernel
- sap_kernel_krnl32nuc
- sap_kernel_krnl64uc
- sap_kernel_krnl64nuc
- sap_kernel_krnl32uc
CWE