CVE-2022-28772 vulnerability in SAP Products
Published on April 12, 2022
By overlong input values an attacker may force overwrite of the internal program stack in SAP Web Dispatcher - versions 7.53, 7.77, 7.81, 7.85, 7.86, or Internet Communication Manager - versions KRNL64NUC 7.22, 7.22EXT, 7.49, KRNL64UC 7.22, 7.22EXT, 7.49, 7.53, KERNEL 7.22, 7.49, 7.53, 7.77, 7.81, 7.85, 7.86, which makes these programs unavailable, leading to denial of service.
Weakness Type
What is a Stack Overflow Vulnerability?
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
CVE-2022-28772 has been classified to as a Stack Overflow vulnerability or weakness.
Products Associated with CVE-2022-28772
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2022-28772 are published in these products:
Affected Versions
SAP SE SAP NetWeaver (Internet Communication Manager):- Version KRNL64NUC 7.22 is affected.
- Version 7.22EXT is affected.
- Version 7.49 is affected.
- Version KRNL64UC 7.22 is affected.
- Version 7.53 is affected.
- Version KERNEL 7.22 is affected.
- Version 7.77 is affected.
- Version 7.81 is affected.
- Version 7.85 is affected.
- Version 7.86 is affected.
- Version 7.53 is affected.
- Version 7.77 is affected.
- Version 7.81 is affected.
- Version 7.85 is affected.
- Version 7.86 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.