SAP NetWeaver AS ABAP and ABAP Platform, versions - KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, KRNL64UC 8.04, 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.53, KERNEL 8.04, 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.53, 7.77, 7.81, 7.84, allows an attacker to send overlong content in the RFC request type thereby crashing the corresponding work process because of memory corruption vulnerability. The work process will attempt to restart itself after the crash and hence the impact on the availability is low.
References
Link | Resource |
---|---|
https://launchpad.support.sap.com/#/notes/3032624 | Permissions Required |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=580617506 | Vendor Advisory |
https://launchpad.support.sap.com/#/notes/3032624 | Permissions Required |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=580617506 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://launchpad.support.sap.com/#/notes/3032624 - Permissions Required | |
References | () https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=580617506 - Vendor Advisory |
27 Jul 2021, 14:19
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=580617506 - Vendor Advisory | |
References | (MISC) https://launchpad.support.sap.com/#/notes/3032624 - Permissions Required | |
CPE | cpe:2.3:a:sap:netweaver_as_abap:7.81:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_abap:7.22:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_abap:7.21:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_abap:krnl32uc_7.21:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_as_abap:krnl64nuc_7.21:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_abap:kernel_8.04:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_as_abap:kernel_8.04:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_abap:7.49:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_abap:7.22ext:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_as_abap:7.22:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_abap:krnl64nuc_7.21:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_as_abap:7.77:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_as_abap:krnl32nuc_7.21:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_as_abap:7.21ext:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_abap:krnl32nuc_7.21:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_as_abap:krnl32uc_7.21:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_as_abap:krnl64uc_8.04:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_as_abap:7.49:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_as_abap:7.53:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_abap:7.21ext:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_abap:7.53:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_as_abap:7.21:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_abap:7.81:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_as_abap:7.22ext:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_abap:7.77:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_abap:krnl64uc_8.04:*:*:*:*:*:*:* |
|
CWE | CWE-787 | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 5.3 |
14 Jul 2021, 12:24
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-07-14 12:15
Updated : 2024-11-21 06:09
NVD link : CVE-2021-33684
Mitre link : CVE-2021-33684
CVE.ORG link : CVE-2021-33684
JSON object : View
Products Affected
sap
- netweaver_abap
- netweaver_application_server_abap
CWE
CWE-787
Out-of-bounds Write