SAP BusinessObjects Business Intelligence Platform allows a high privilege user to run client desktop applications even if some of the DLLs are not digitally signed or if the signature is broken. The attacker needs to have local access to the vulnerable system to perform DLL related tasks. This could result in a high impact on confidentiality and integrity of the application.
Metrics
Affected Vendors & Products
References
History
Tue, 17 Sep 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Sap
Sap business Objects Business Intelligence Platform |
|
CPEs | cpe:2.3:a:sap:business_objects_business_intelligence_platform:430:*:*:*:*:*:*:* | |
Vendors & Products |
Sap
Sap business Objects Business Intelligence Platform |
|
Metrics |
ssvc
|
Tue, 10 Sep 2024 04:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | SAP BusinessObjects Business Intelligence Platform allows a high privilege user to run client desktop applications even if some of the DLLs are not digitally signed or if the signature is broken. The attacker needs to have local access to the vulnerable system to perform DLL related tasks. This could result in a high impact on confidentiality and integrity of the application. | |
Title | DLL hijacking vulnerability in SAP BusinessObjects Business Intelligence Platform | |
Weaknesses | CWE-426 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: sap
Published: 2024-09-10T04:32:43.378Z
Updated: 2024-09-16T16:17:11.239Z
Reserved: 2024-08-26T10:39:20.932Z
Link: CVE-2024-45281
Vulnrichment
Updated: 2024-09-10T13:19:25.520Z
NVD
Status : Awaiting Analysis
Published: 2024-09-10T05:15:12.007
Modified: 2024-09-10T12:09:50.377
Link: CVE-2024-45281
Redhat
No data.