A memory corruption vulnerability exists in SAPCAR allowing an attacker to craft malicious SAPCAR archives. When a high privileged victim extracts this malicious archive, it gets processed by SAPCAR on their system, resulting in out-of-bounds memory read and write. This could lead to file extraction and file overwrite outside the intended directories. This vulnerability has low impact on the confidentiality, integrity and availability of the application.
Metrics
Affected Vendors & Products
References
History
Mon, 14 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Tue, 08 Jul 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 08 Jul 2025 00:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A memory corruption vulnerability exists in SAPCAR allowing an attacker to craft malicious SAPCAR archives. When a high privileged victim extracts this malicious archive, it gets processed by SAPCAR on their system, resulting in out-of-bounds memory read and write. This could lead to file extraction and file overwrite outside the intended directories. This vulnerability has low impact on the confidentiality, integrity and availability of the application. | |
Title | Memory Corruption vulnerability in SAPCAR | |
Weaknesses | CWE-787 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: sap
Published: 2025-07-08T00:37:02.496Z
Updated: 2025-07-08T16:13:18.678Z
Reserved: 2025-04-16T13:25:42.158Z
Link: CVE-2025-42971

Updated: 2025-07-08T14:28:39.280Z

Status : Awaiting Analysis
Published: 2025-07-08T01:15:24.463
Modified: 2025-07-08T16:18:14.207
Link: CVE-2025-42971

No data.