var-202106-1806
Vulnerability from variot

SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server), versions - KRNL32NUC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73, allows an unauthenticated attacker without specific knowledge of the system to send a specially crafted packet over a network which will trigger an internal error in the system due to improper input validation in method EnqConvUniToSrvReq() causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified. SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server) Is vulnerable to input validation.Denial of service (DoS) It may be put into a state.

Advisory Information

  • Public Release Date: 11/22/2021
  • Security Advisory ID: ONAPSIS-2021-0017
  • Researcher(s): Yvan Genuer

Vulnerability Information

  • Vendor: SAP
  • Affected Components: All SAP kernel 32 and 64 bits, unicode and no-unicode
  • SAP KERNEL 7.22
  • SAP KERNEL 7.22EXT
  • SAP KERNEL 7.49
  • SAP KERNEL 7.53
  • SAP KERNEL 7.73
  • SAP KERNEL 7.77
  • SAP KERNEL 7.81
  • SAP KERNEL 8.04

(Check SAP Note 3020104 for detailed information on affected releases)

  • Vulnerability Class: CWE-20, CWE-125, CWE-476
  • CVSS v3 score: 7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Risk Level: High
  • Assigned CVE: CVE-2021-27606 CVE-2021-27629 CVE-2021-27630 CVE-2021-27631 CVE-2021-27632
  • Vendor patch Information: SAP Security NOTE 3020104

Affected Components Description

The SAP Enqueue server is the component that manages the lock table. There is only one ENQ server in a distributed SAP System. It receives a lock request and checks the lock table to determine collision. This is a mandatory service for SAP Netweaver system, whitout it any modification in the SAP system is not possible.

Vulnerability Details

CVE-2021-27606: Attacker can craft malicious enqueue packet to force a read out of memory bound in function EncOAMParamStore(). A comparaison value in a loop can be tricked and forced to a high value. Eventually crashed when some relevant register was overwritten.

CVE-2021-27629: Attacker can craft malicious enqueue packet to force a read out of memory bound in function EncPSetUnsupported. A counter for a movs instruction can be controlled by an attacker leading to a crash.

CVE-2021-27630: A NULL pointer dereference exists in EnqConvUniToSrvReq when the program tries to calculate the size of part of the message from the input packet. A register points to the content of the packet and could be controlled by the attacker.

CVE-2021-27631: A NULL pointer dereference exists in EnqConvUniToSrvReq when the program tries to calculate the size of part of the message from the input packet. A register points to the content of the packet and could be controlled by the attacker.

CVE-2021-27632: A NULL pointer dereference exists in EnqConvUniToSrvReq(), where the function reads inputs from the provided packet then uses them to calculate an offset for a pointer. Both inputs are user controlled, and can lead to dereference a register that will be used in EnqConvObjToStr.

Solution

SAP has released SAP Note 3020104 which provide patched versions of the affected components.

The patches can be downloaded from https://launchpad.support.sap.com/#/notes/3020104.

Onapsis strongly recommends SAP customers to download the related security fixes and apply them to the affected components in order to reduce business risks.

Report Timeline

  • MM-DD-YYYY:
  • 02/01/2021: Onapsis sends details to SAP
  • 02/04/2021: SAP provides internal ID
  • 02/08/2021: SAP confirms CVSS
  • 06/09/2021: SAP releases SAP Note fixing the issue.
  • 11/22/2021: Advisory published

References

  • Onapsis blogpost: https://www.onapsis.com/blog/sap-security-patch-day-june-2021-multiple-memory-corruption-vulnerabilities-can-lead-system
  • CVE Mitre: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27606 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27629 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27630 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27631 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27632
  • Vendor Patch: https://launchpad.support.sap.com/#/notes/3020104

About Onapsis Research Labs

Onapsis Research Labs provides the industry analysis of key security issues that impact business-critical systems and applications. Delivering frequent and timely security and compliance advisories with associated risk levels, Onapsis Research Labs combine in-depth knowledge and experience to deliver technical and business-context with sound security judgment to the broader information security community.

Find all reported vulnerabilities at https://github.com/Onapsis/vulnerability_advisories

About Onapsis, Inc.

Onapsis protects the mission-critical applications that run the global economy, from the core to the cloud. The Onapsis Platform uniquely delivers actionable insight, secure change, automated governance and continuous monitoring for critical systems—ERP, CRM, PLM, HCM, SCM and BI applications—from leading vendors such as SAP, Oracle, Salesforce and others, while keeping them protected and compliant.

For more information, connect with us on Twitter or LinkedIn, or visit us at https://www.onapsis.com.

License

This advisory is licensed under a Creative Commons 4.0 BY-ND International License

-- This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error please notify the system manager. This message contains confidential information and is intended only for the individual named. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately by e-mail if you have received this e-mail by mistake and delete this e-mail from your system. If you are not the intended recipient you are notified that disclosing, copying, distributing or taking any action in reliance on the contents of this information is strictly prohibited

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202106-1806",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "netweaver as abap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sap",
        "version": "kernel_7.73"
      },
      {
        "model": "netweaver as abap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sap",
        "version": "krnl64uc_7.53"
      },
      {
        "model": "netweaver as abap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sap",
        "version": "kernel_7.53"
      },
      {
        "model": "netweaver as abap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sap",
        "version": "krnl64uc_7.22"
      },
      {
        "model": "netweaver as abap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sap",
        "version": "kernel_8.04"
      },
      {
        "model": "netweaver as abap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sap",
        "version": "krnl64nuc_7.49"
      },
      {
        "model": "netweaver as abap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sap",
        "version": "kernel_7.81"
      },
      {
        "model": "netweaver as abap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sap",
        "version": "kernel_7.82"
      },
      {
        "model": "netweaver as abap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sap",
        "version": "krnl32nuc_7.22ext"
      },
      {
        "model": "netweaver as abap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sap",
        "version": "krnl64uc_7.49"
      },
      {
        "model": "netweaver as abap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sap",
        "version": "krnl64uc_7.73"
      },
      {
        "model": "netweaver as abap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sap",
        "version": "krnl64uc_7.22ext"
      },
      {
        "model": "netweaver as abap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sap",
        "version": "krnl64nuc_7.22ext"
      },
      {
        "model": "netweaver as abap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sap",
        "version": "krnl64nuc_7.22"
      },
      {
        "model": "netweaver as abap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sap",
        "version": "kernel_7.49"
      },
      {
        "model": "netweaver as abap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sap",
        "version": "kernel_7.77"
      },
      {
        "model": "netweaver as abap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sap",
        "version": "kernel_7.22"
      },
      {
        "model": "netweaver as abap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sap",
        "version": "kernel_7.83"
      },
      {
        "model": "netweaver as abap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sap",
        "version": "krnl32nuc_7.22"
      },
      {
        "model": "netweaver as abap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sap",
        "version": "krnl64uc_8.04"
      },
      {
        "model": "netweaver as abap",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sap",
        "version": null
      },
      {
        "model": "netweaver as abap",
        "scope": null,
        "trust": 0.8,
        "vendor": "sap",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-007747"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-27630"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_abap:kernel_7.22:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_abap:kernel_7.49:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_abap:kernel_7.53:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_abap:kernel_7.73:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_abap:kernel_7.77:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_abap:kernel_7.81:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_abap:kernel_7.82:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_abap:kernel_7.83:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_abap:kernel_8.04:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_abap:krnl32nuc_7.22:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_abap:krnl32nuc_7.22ext:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_abap:krnl64nuc_7.22:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_abap:krnl64nuc_7.22ext:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_abap:krnl64nuc_7.49:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_abap:krnl64uc_7.22:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_abap:krnl64uc_7.22ext:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_abap:krnl64uc_7.49:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_abap:krnl64uc_7.53:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_abap:krnl64uc_7.73:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sap:netweaver_as_abap:krnl64uc_8.04:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2021-27630"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Yvan Genuer",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "164595"
      }
    ],
    "trust": 0.1
  },
  "cve": "CVE-2021-27630",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": null,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULMON",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2021-27630",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "MEDIUM",
            "trust": 1.9,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2021-27630",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2021-27630",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2021-27630",
            "trust": 1.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202106-457",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2021-27630",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2021-27630"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-007747"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202106-457"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-27630"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server), versions - KRNL32NUC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73, allows an unauthenticated attacker without specific knowledge of the system to send a specially crafted packet over a network which will trigger an internal error in the system due to improper input validation in method EnqConvUniToSrvReq() causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified. SAP NetWeaver ABAP Server and  ABAP Platform (Enqueue Server) Is vulnerable to input validation.Denial of service  (DoS) It may be put into a state. \n\n\n## Advisory Information\n\n- Public Release Date: 11/22/2021\n- Security Advisory ID: ONAPSIS-2021-0017\n- Researcher(s): Yvan Genuer\n\n\n## Vulnerability Information\n\n- Vendor: SAP\n- Affected Components: All SAP kernel 32 and 64 bits, unicode and no-unicode\n  - SAP KERNEL 7.22\n  - SAP KERNEL 7.22EXT\n  - SAP KERNEL 7.49\n  - SAP KERNEL 7.53\n  - SAP KERNEL 7.73\n  - SAP KERNEL 7.77\n  - SAP KERNEL 7.81\n  - SAP KERNEL 8.04\n\n  (Check SAP Note 3020104 for detailed information on affected releases)\n\n- Vulnerability Class: CWE-20, CWE-125, CWE-476\n- CVSS v3 score: 7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\n- Risk Level: High\n- Assigned CVE:\n  CVE-2021-27606\n  CVE-2021-27629\n  CVE-2021-27630\n  CVE-2021-27631\n  CVE-2021-27632\n- Vendor patch Information: SAP Security NOTE 3020104\n\n\n## Affected Components Description\n\nThe SAP Enqueue server is the component that manages the lock table. There\nis\nonly one ENQ server in a distributed SAP System. It receives a lock request\nand\nchecks the lock table to determine collision. This is a mandatory service\nfor\nSAP Netweaver system, whitout it any modification in the SAP system is not\npossible. \n\n## Vulnerability Details\n\nCVE-2021-27606: Attacker can craft malicious enqueue packet to force a read\nout\nof memory bound in function `EncOAMParamStore()`. A comparaison value in a\nloop\ncan be tricked and forced to a high value. Eventually crashed when some\nrelevant\nregister was overwritten. \n\nCVE-2021-27629: Attacker can craft malicious enqueue packet to force a read\nout\nof memory bound in function `EncPSetUnsupported`. A counter for a movs\ninstruction can be controlled by an attacker leading to a crash. \n\nCVE-2021-27630: A NULL pointer dereference exists in `EnqConvUniToSrvReq`\nwhen\nthe program tries to calculate the size of part of the message from the\ninput\npacket. A register points to the content of the packet and could be\ncontrolled\nby the attacker. \n\nCVE-2021-27631: A NULL pointer dereference exists in `EnqConvUniToSrvReq`\nwhen\nthe program tries to calculate the size of part of the message from the\ninput\npacket. A register points to the content of the packet and could be\ncontrolled\nby the attacker. \n\nCVE-2021-27632: A NULL pointer dereference exists in `EnqConvUniToSrvReq()`,\nwhere the function reads inputs from the provided packet then uses them to\ncalculate an offset for a pointer. Both inputs are user controlled, and can\nlead\nto dereference a register that will be used in `EnqConvObjToStr`. \n\n\n## Solution\n\nSAP has released SAP Note 3020104 which provide patched versions of the\naffected components. \n\nThe patches can be downloaded from\nhttps://launchpad.support.sap.com/#/notes/3020104. \n\nOnapsis strongly recommends SAP customers to download the related\nsecurity fixes and apply them to the affected components in order to\nreduce business risks. \n\n\n## Report Timeline\n\n - MM-DD-YYYY:\n - 02/01/2021: Onapsis sends details to SAP\n - 02/04/2021: SAP provides internal ID\n - 02/08/2021: SAP confirms CVSS\n - 06/09/2021: SAP releases SAP Note fixing the issue. \n - 11/22/2021: Advisory published\n\n## References\n\n- Onapsis blogpost:\nhttps://www.onapsis.com/blog/sap-security-patch-day-june-2021-multiple-memory-corruption-vulnerabilities-can-lead-system\n- CVE Mitre:\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27606\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27629\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27630\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27631\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27632\n- Vendor Patch:\nhttps://launchpad.support.sap.com/#/notes/3020104\n\n\n## About Onapsis Research Labs\n\nOnapsis Research Labs provides the industry analysis of key security\nissues that impact business-critical systems and applications. \nDelivering frequent and timely security and compliance advisories with\nassociated risk levels, Onapsis Research Labs combine in-depth knowledge\nand experience to deliver technical and business-context with sound\nsecurity judgment to the broader information security community. \n\nFind all reported vulnerabilities at\nhttps://github.com/Onapsis/vulnerability_advisories\n\n\n## About Onapsis, Inc. \n\nOnapsis protects the mission-critical applications that run the global\neconomy,\nfrom the core to the cloud. The Onapsis Platform uniquely delivers\nactionable\ninsight, secure change, automated governance and continuous monitoring for\ncritical\nsystems\u2014ERP, CRM, PLM, HCM, SCM and BI applications\u2014from leading vendors\nsuch as SAP,\nOracle, Salesforce and others, while keeping them protected and compliant. \n\nFor more information, connect with us on Twitter or LinkedIn, or visit us at\nhttps://www.onapsis.com. \n\n\n## License\nThis advisory is licensed under a [Creative Commons 4.0 BY-ND International\nLicense](https://creativecommons.org/licenses/by-nd/4.0/legalcode)\n\u003cbr\u003e\u003cbr\u003e\u003cimg src=\"../../images/license_cc.png\" align=\"left\" height=\"36\"\nwidth=\"112\" \u003e\n\n-- \nThis email and any files transmitted with it are confidential and intended \nsolely for the use of the individual or entity to whom they are addressed. \nIf you have received this email in error please notify the system manager. \nThis message contains confidential information and is intended only for the \nindividual named. If you are not the named addressee you should not \ndisseminate, distribute or copy this e-mail. \nPlease notify the sender \nimmediately by e-mail if you have received this e-mail by mistake and \ndelete this e-mail from your system. If you are not the intended recipient \nyou are notified that disclosing, copying, distributing or taking any \naction in reliance on the contents of this information is strictly \nprohibited",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2021-27630"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-007747"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-27630"
      },
      {
        "db": "PACKETSTORM",
        "id": "164595"
      }
    ],
    "trust": 1.8
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2021-27630",
        "trust": 3.4
      },
      {
        "db": "PACKETSTORM",
        "id": "164595",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-007747",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202106-457",
        "trust": 0.6
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-27630",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2021-27630"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-007747"
      },
      {
        "db": "PACKETSTORM",
        "id": "164595"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202106-457"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-27630"
      }
    ]
  },
  "id": "VAR-202106-1806",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.19642857
  },
  "last_update_date": "2022-05-04T09:15:24.719000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SAP\u00a0Security\u00a0Patch\u00a0Day\u00a0-\u00a0June\u00a02021",
        "trust": 0.8,
        "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageid=578125999"
      },
      {
        "title": "SAP NetWeaver Enter the fix for the verification error vulnerability",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=154235"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-007747"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202106-457"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.0
      },
      {
        "problemtype": "Incorrect input confirmation (CWE-20) [NVD Evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-007747"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-27630"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.1,
        "url": "http://packetstormsecurity.com/files/164595/sap-netweaver-abap-enqueue-memory-corruption.html"
      },
      {
        "trust": 2.6,
        "url": "http://seclists.org/fulldisclosure/2021/oct/29"
      },
      {
        "trust": 1.8,
        "url": "https://launchpad.support.sap.com/#/notes/3020104"
      },
      {
        "trust": 1.7,
        "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageid=578125999"
      },
      {
        "trust": 0.9,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-27630"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/sap-multiple-vulnerabilities-of-june-2021-35633"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/20.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2021-27606"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-27606"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-27632"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.support.sap.com/#/notes/3020104."
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2021-27632"
      },
      {
        "trust": 0.1,
        "url": "https://www.onapsis.com."
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-27629"
      },
      {
        "trust": 0.1,
        "url": "https://creativecommons.org/licenses/by-nd/4.0/legalcode)"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2021-27631"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/onapsis/vulnerability_advisories"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2021-27629"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-27631"
      },
      {
        "trust": 0.1,
        "url": "https://www.onapsis.com/blog/sap-security-patch-day-june-2021-multiple-memory-corruption-vulnerabilities-can-lead-system"
      },
      {
        "trust": 0.1,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2021-27630"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2021-27630"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-007747"
      },
      {
        "db": "PACKETSTORM",
        "id": "164595"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202106-457"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-27630"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULMON",
        "id": "CVE-2021-27630"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-007747"
      },
      {
        "db": "PACKETSTORM",
        "id": "164595"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202106-457"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-27630"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-06-09T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-27630"
      },
      {
        "date": "2022-02-22T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-007747"
      },
      {
        "date": "2021-10-22T15:36:22",
        "db": "PACKETSTORM",
        "id": "164595"
      },
      {
        "date": "2021-06-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202106-457"
      },
      {
        "date": "2021-06-09T14:15:00",
        "db": "NVD",
        "id": "CVE-2021-27630"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2021-10-22T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-27630"
      },
      {
        "date": "2022-02-22T07:03:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-007747"
      },
      {
        "date": "2021-10-25T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202106-457"
      },
      {
        "date": "2021-11-04T13:12:00",
        "db": "NVD",
        "id": "CVE-2021-27630"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202106-457"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SAP\u00a0NetWeaver\u00a0ABAP\u00a0Server\u00a0 and \u00a0ABAP\u00a0Platform\u00a0 Input confirmation vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-007747"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202106-457"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.