Bug 2081977 (CVE-2021-33670)

Summary: CVE-2021-33670 SAP-NetWeaver: Denial of Service in SAP NetWeaver JAVA
Product: [Other] Security Response Reporter: Avinash Hanwate <ahanwate>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: aileenc, avibelli, bgeorges, chazlett, clement.escoffier, dandread, dkreling, drieden, ggaughan, gmalinko, gsmet, hamadhan, hbraun, janstey, jnethert, jochrist, jschatte, jwon, krathod, lthon, mszynkie, pantinor, pdelbell, peholase, pgallagh, pjindal, probinso, rareddy, rruss, rsvoboda, sbiarozk, sdouglas
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-05-06 21:41:47 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2081978    

Description Avinash Hanwate 2022-05-05 06:51:00 UTC
SAP Netweaver Java has a stack of standard J2EE filters responsible to do some controls and statistical operations over each received request. The
vulnerability exists because one of those filters is keeping information about the different HTTP methods received by the server, but it is not properly controlling how much memory it needs to store that information. After sending a specially crafted request, an attacker is able to make that filter raise an OutOfMemoryError, making the virtual machine crash.

References:
- https://onapsis.com/blog/sap-security-patch-day-july-2021-serious-vulnerabilities-sap-netweaver-java-fixed
- Vendor Patch: https://launchpad.support.sap.com/#/notes/3056652