SAP Kernel (RFC), KRNL32NUC, KRNL32UC and KRNL64NUC before versions 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64UC, before versions 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.73 and KERNEL before versions 7.21, 7.49, 7.53, 7.73, 7.76 SAP GUI for Windows (BC-FES-GUI) before versions 7.5, 7.6, and SAP GUI for Java (BC-FES-JAV) before version 7.5, allow an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service.
References
Link | Resource |
---|---|
https://launchpad.support.sap.com/#/notes/2786151 | Permissions Required Vendor Advisory |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=525962506 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2019-09-10 10:15
Updated : 2020-08-24 10:37
NVD link : CVE-2019-0365
Mitre link : CVE-2019-0365
JSON object : View
CWE
Products Affected
sap
- sap_kernel_krnl32nuc
- sap_kernel_krnl32uc
- sap_kernel_krnl64nuc
- sap_kernel
- sap_kernel_krnl64uc