CVE-2021-27597

SAP NetWeaver AS for ABAP (RFC Gateway), versions - KRNL32NUC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73,7.77,7.81,7.82,7.83, allows an unauthenticated attacker without specific knowledge of the system to send a specially crafted packet over a network which will trigger an internal error in the system due to improper input validation in method memmove() causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified.
References
Link Resource
https://launchpad.support.sap.com/#/notes/3020209 Permissions Required Vendor Advisory
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=578125999 Broken Link Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sap:netweaver_abap:kernel_7.22:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_abap:kernel_7.49:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_abap:kernel_7.53:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_abap:kernel_7.73:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_abap:kernel_8.04:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_abap:krnl32nuc_7.22:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_abap:krnl32nuc_7.22ext:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_abap:krnl64nuc_7.22:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_abap:krnl64nuc_7.22ext:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_abap:krnl64nuc_7.49:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_abap:krnl64uc_7.22:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_abap:krnl64uc_7.22ext:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_abap:krnl64uc_7.49:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_abap:krnl64uc_7.53:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_abap:krnl64uc_7.73:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_abap:krnl64uc_8.04:*:*:*:*:*:*:*

History

31 Oct 2022, 14:48

Type Values Removed Values Added
References (MISC) https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=578125999 - Vendor Advisory (MISC) https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=578125999 - Broken Link, Vendor Advisory

17 Oct 2022, 16:15

Type Values Removed Values Added
References
  • {'url': 'http://packetstormsecurity.com/files/164596/SAP-NetWeaver-ABAP-Gateway-Memory-Corruption.html', 'name': 'http://packetstormsecurity.com/files/164596/SAP-NetWeaver-ABAP-Gateway-Memory-Corruption.html', 'tags': ['Patch', 'Third Party Advisory', 'VDB Entry'], 'refsource': 'MISC'}
  • {'url': 'http://seclists.org/fulldisclosure/2021/Oct/30', 'name': '20211022 Onapsis Security Advisory 2021-0018: [Multiple CVEs] Memory Corruption vulnerability in SAP NetWeaver ABAP Gateway service', 'tags': ['Mailing List', 'Patch', 'Third Party Advisory'], 'refsource': 'FULLDISC'}

07 Oct 2022, 19:16

Type Values Removed Values Added
CWE CWE-20 CWE-125

02 Nov 2021, 18:19

Type Values Removed Values Added
References (FULLDISC) http://seclists.org/fulldisclosure/2021/Oct/30 - (FULLDISC) http://seclists.org/fulldisclosure/2021/Oct/30 - Mailing List, Patch, Third Party Advisory
References (MISC) http://packetstormsecurity.com/files/164596/SAP-NetWeaver-ABAP-Gateway-Memory-Corruption.html - (MISC) http://packetstormsecurity.com/files/164596/SAP-NetWeaver-ABAP-Gateway-Memory-Corruption.html - Patch, Third Party Advisory, VDB Entry

22 Oct 2021, 18:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/164596/SAP-NetWeaver-ABAP-Gateway-Memory-Corruption.html -

22 Oct 2021, 16:15

Type Values Removed Values Added
References
  • (FULLDISC) http://seclists.org/fulldisclosure/2021/Oct/30 -

14 Jun 2021, 20:00

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
CWE CWE-20
CPE cpe:2.3:a:sap:netweaver_abap:krnl32nuc_7.22:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_abap:krnl64nuc_7.49:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_abap:krnl64uc_7.22:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_abap:krnl64uc_7.22ext:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_abap:krnl64uc_7.49:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_abap:kernel_7.49:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_abap:krnl64uc_7.53:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_abap:krnl64uc_8.04:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_abap:krnl64uc_7.73:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_abap:kernel_8.04:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_abap:kernel_7.73:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_abap:kernel_7.22:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_abap:krnl64nuc_7.22ext:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_abap:krnl32nuc_7.22ext:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_abap:kernel_7.53:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_abap:krnl64nuc_7.22:*:*:*:*:*:*:*
References (MISC) https://launchpad.support.sap.com/#/notes/3020209 - (MISC) https://launchpad.support.sap.com/#/notes/3020209 - Permissions Required, Vendor Advisory
References (MISC) https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=578125999 - (MISC) https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=578125999 - Vendor Advisory

09 Jun 2021, 15:04

Type Values Removed Values Added
New CVE

Information

Published : 2021-06-09 14:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-27597

Mitre link : CVE-2021-27597

CVE.ORG link : CVE-2021-27597


JSON object : View

Products Affected

sap

  • netweaver_abap
CWE
CWE-125

Out-of-bounds Read