{ "schema_version": "1.4.0", "id": "GHSA-m56g-mv6p-cqvv", "modified": "2022-05-01T07:15:47Z", "published": "2022-05-01T07:15:47Z", "aliases": [ "CVE-2006-4133" ], "details": "Heap-based buffer overflow in SAP Internet Graphics Service (IGS) 6.40 and earlier, and 7.00 and earlier, allows remote attackers to cause a denial of service (crash) or execute arbitrary code via an HTTP request with an ADM:GETLOGFILE command and a long portwatcher argument, which triggers the overflow during error message construction when the _snprintf function returns a negative value that is used in a memcpy operation.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4133" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28334" }, { "type": "WEB", "url": "http://secunia.com/advisories/21448" }, { "type": "WEB", "url": "http://securityreason.com/securityalert/1386" }, { "type": "WEB", "url": "http://securitytracker.com/id?1016675" }, { "type": "WEB", "url": "http://securitytracker.com/id?1017534" }, { "type": "WEB", "url": "http://www.cybsec.com/vuln/CYBSEC-Security_Pre-Advisory_SAP_IGS_Remote_Buffer_Overflow.pdf" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/259540" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/442840/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/457286/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/472889/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/19470" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/3267" } ], "database_specific": { "cwe_ids": [], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2006-08-14T23:04:00Z" } }