Description
An issue was discovered in HCC Nichestack 3.0. The code that parses TCP packets relies on an unchecked value of the IP payload size (extracted from the IP header) to compute the length of the TCP payload within the TCP checksum computation function. When the IP payload size is set to be smaller than the size of the IP header, the TCP checksum computation function may read out of bounds (a low-impact write-out-of-bounds is also possible).
Published: 2021-08-19
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-23343 An issue was discovered in HCC Nichestack 3.0. The code that parses TCP packets relies on an unchecked value of the IP payload size (extracted from the IP header) to compute the length of the TCP payload within the TCP checksum computation function. When the IP payload size is set to be smaller than the size of the IP header, the TCP checksum computation function may read out of bounds (a low-impact write-out-of-bounds is also possible).
History

No history.

Subscriptions

Hcc-embedded Nichestack
Siemens Sentron 3wa Com190 Sentron 3wa Com190 Firmware Sentron 3wl Com35 Sentron 3wl Com35 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T17:09:14.969Z

Reserved: 2020-12-24T00:00:00.000Z

Link: CVE-2020-35684

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-08-19T12:15:08.020

Modified: 2024-11-21T05:27:50.820

Link: CVE-2020-35684

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses