CVE-2018-2439
Summary
| CVE | CVE-2018-2439 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-07-10 18:29:00 UTC |
| Updated | 2018-09-12 19:05:00 UTC |
| Description | The SAP Internet Graphics Server (IGS), 7.20, 7.20EXT, 7.45, 7.49, 7.53, has insufficient request validation (for example, where the request is validated for authenticity and validity) and under certain conditions, will process invalid requests. Several areas of the SAP Internet Graphics Server (IGS) did not require sufficient input validation. Namely, the SAP Internet Graphics Server (IGS) HTTP and RFC listener, SAP Internet Graphics Server (IGS) portwatcher when registering a portwatcher to the multiplexer and the SAP Internet Graphics Server (IGS) multiplexer had insufficient input validation and thus allowing a malformed data packet to cause a crash. |
Risk And Classification
Problem Types: CWE-20
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Sap | Internet Graphics Server | 7.20 | All | All | All |
| Application | Sap | Internet Graphics Server | 7.20ext | All | All | All |
| Application | Sap | Internet Graphics Server | 7.45 | All | All | All |
| Application | Sap | Internet Graphics Server | 7.49 | All | All | All |
| Application | Sap | Internet Graphics Server | 7.53 | All | All | All |
| Application | Sap | Internet Graphics Server | 7.20 | All | All | All |
| Application | Sap | Internet Graphics Server | 7.20ext | All | All | All |
| Application | Sap | Internet Graphics Server | 7.45 | All | All | All |
| Application | Sap | Internet Graphics Server | 7.49 | All | All | All |
| Application | Sap | Internet Graphics Server | 7.53 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| launchpad.support.sap.com | MISC | launchpad.support.sap.com | Permissions Required, Vendor Advisory |
| Malformed Request | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| SAP Security Patch Day – July 2018 - Product Security Response at SAP - Community Wiki | CONFIRM | wiki.scn.sap.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.