CVE-2021-33684
Summary
| CVE | CVE-2021-33684 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-07-14 12:15:00 UTC |
| Updated | 2022-10-06 15:20:00 UTC |
| Description | SAP NetWeaver AS ABAP and ABAP Platform, versions - KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, KRNL64UC 8.04, 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.53, KERNEL 8.04, 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.53, 7.77, 7.81, 7.84, allows an attacker to send overlong content in the RFC request type thereby crashing the corresponding work process because of memory corruption vulnerability. The work process will attempt to restart itself after the crash and hence the impact on the availability is low. |
Risk And Classification
Problem Types: CWE-787
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Sap | Netweaver Abap | 7.21 | All | All | All |
| Application | Sap | Netweaver Abap | 7.21ext | All | All | All |
| Application | Sap | Netweaver Abap | 7.22 | All | All | All |
| Application | Sap | Netweaver Abap | 7.22ext | All | All | All |
| Application | Sap | Netweaver Abap | 7.49 | All | All | All |
| Application | Sap | Netweaver Abap | 7.53 | All | All | All |
| Application | Sap | Netweaver Abap | 7.77 | All | All | All |
| Application | Sap | Netweaver Abap | 7.81 | All | All | All |
| Application | Sap | Netweaver Abap | kernel_8.04 | All | All | All |
| Application | Sap | Netweaver Abap | krnl32nuc_7.21 | All | All | All |
| Application | Sap | Netweaver Abap | krnl32uc_7.21 | All | All | All |
| Application | Sap | Netweaver Abap | krnl64nuc_7.21 | All | All | All |
| Application | Sap | Netweaver Abap | krnl64uc_8.04 | All | All | All |
| Application | Sap | Netweaver Application Server Abap | 7.21 | All | All | All |
| Application | Sap | Netweaver Application Server Abap | 7.21ext | All | All | All |
| Application | Sap | Netweaver Application Server Abap | 7.22 | All | All | All |
| Application | Sap | Netweaver Application Server Abap | 7.22ext | All | All | All |
| Application | Sap | Netweaver Application Server Abap | 7.49 | All | All | All |
| Application | Sap | Netweaver Application Server Abap | 7.53 | All | All | All |
| Application | Sap | Netweaver Application Server Abap | 7.77 | All | All | All |
| Application | Sap | Netweaver Application Server Abap | 7.81 | All | All | All |
| Application | Sap | Netweaver Application Server Abap | kernel_8.04 | All | All | All |
| Application | Sap | Netweaver Application Server Abap | krnl32nuc_7.21 | All | All | All |
| Application | Sap | Netweaver Application Server Abap | krnl32uc_7.21 | All | All | All |
| Application | Sap | Netweaver Application Server Abap | krnl64nuc_7.21 | All | All | All |
| Application | Sap | Netweaver Application Server Abap | krnl64uc_8.04 | All | All | All |
| Application | Sap | Netweaver As Abap | 7.21 | All | All | All |
| Application | Sap | Netweaver As Abap | 7.21ext | All | All | All |
| Application | Sap | Netweaver As Abap | 7.22 | All | All | All |
| Application | Sap | Netweaver As Abap | 7.22ext | All | All | All |
| Application | Sap | Netweaver As Abap | 7.49 | All | All | All |
| Application | Sap | Netweaver As Abap | 7.53 | All | All | All |
| Application | Sap | Netweaver As Abap | 7.77 | All | All | All |
| Application | Sap | Netweaver As Abap | 7.81 | All | All | All |
| Application | Sap | Netweaver As Abap | kernel_8.04 | All | All | All |
| Application | Sap | Netweaver As Abap | krnl32nuc_7.21 | All | All | All |
| Application | Sap | Netweaver As Abap | krnl32uc_7.21 | All | All | All |
| Application | Sap | Netweaver As Abap | krnl64nuc_7.21 | All | All | All |
| Application | Sap | Netweaver As Abap | krnl64uc_8.04 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| SAP Security Patch Day – July 2021 - Product Security Response at SAP - Community Wiki | MISC | wiki.scn.sap.com | |
| launchpad.support.sap.com | MISC | launchpad.support.sap.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.