First published: Wed Jun 09 2021(Updated: )
SAP Internet Graphics Service, versions - 7.20,7.20EXT,7.53,7.20_EX2,7.81, allows an unauthenticated attacker after retrieving an existing system state value can submit a malicious IGS request over a network which due to insufficient input validation in method Ups::AddPart() which will trigger an internal memory corruption error in the system causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Internet Graphics Server | =7.20 | |
SAP Internet Graphics Server | =7.20ex2 | |
SAP Internet Graphics Server | =7.20ext | |
SAP Internet Graphics Server | =7.53 | |
SAP Internet Graphics Server | =7.81 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27620 has a medium severity rating due to the potential for unauthenticated access and exploitation of the vulnerability.
To fix CVE-2021-27620, apply the latest security patches provided by SAP for the affected versions of the Internet Graphics Service.
CVE-2021-27620 affects SAP Internet Graphics Service versions 7.20, 7.20EXT, 7.53, 7.20_EX2, and 7.81.
CVE-2021-27620 is classified as an input validation vulnerability that allows for remote exploitation.
CVE-2021-27620 can be exploited by unauthenticated attackers who can send malicious requests over the network.