First published: Wed Jun 09 2021(Updated: )
SAP Internet Graphics Service, versions - 7.20,7.20EXT,7.53,7.20_EX2,7.81, allows an unauthenticated attacker after retrieving an existing system state value can submit a malicious IGS request over a network which due to insufficient input validation in method CXmlUtility::CheckLength() which will trigger an internal memory corruption error in the system causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Internet Graphics Server | =7.20 | |
SAP Internet Graphics Server | =7.20ex2 | |
SAP Internet Graphics Server | =7.20ext | |
SAP Internet Graphics Server | =7.53 | |
SAP Internet Graphics Server | =7.81 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27623 has been classified as a high severity vulnerability due to its potential to allow unauthenticated access to critical system functions.
To fix CVE-2021-27623, apply the latest security patches released by SAP for the affected Netweaver versions.
CVE-2021-27623 affects SAP Internet Graphics Service versions 7.20, 7.20EXT, 7.53, 7.20_EX2, and 7.81.
Yes, CVE-2021-27623 can be exploited remotely by an attacker who can send specially crafted requests to the vulnerable server.
CVE-2021-27623 can lead to denial of service attacks due to insufficient input validation in the affected methods.