SAP NetWeaver AS ABAP and ABAP Platform, versions - KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, KRNL64UC 8.04, 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.53, KERNEL 8.04, 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.53, 7.77, 7.81, 7.84, allows an attacker to send overlong content in the RFC request type thereby crashing the corresponding work process because of memory corruption vulnerability. The work process will attempt to restart itself after the crash and hence the impact on the availability is low.
References
Link | Resource |
---|---|
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=580617506 | Vendor Advisory |
https://launchpad.support.sap.com/#/notes/3032624 | Permissions Required |
Configurations
Configuration 1 (hide)
|
Information
Published : 2021-07-14 05:15
Updated : 2022-10-06 08:20
NVD link : CVE-2021-33684
Mitre link : CVE-2021-33684
JSON object : View
CWE
CWE-787
Out-of-bounds Write
Products Affected
sap
- netweaver_abap
- netweaver_application_server_abap