An issue was discovered in tcp_rcv() in nptcp.c in HCC embedded InterNiche 4.0.1. The TCP header processing code doesn't sanitize the value of the IP total length field (header length + data length). With a crafted IP packet, an integer overflow occurs whenever the value of the IP data length is calculated by subtracting the length of the header from the total length of the IP packet.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-18311 An issue was discovered in tcp_rcv() in nptcp.c in HCC embedded InterNiche 4.0.1. The TCP header processing code doesn't sanitize the value of the IP total length field (header length + data length). With a crafted IP packet, an integer overflow occurs whenever the value of the IP data length is calculated by subtracting the length of the header from the total length of the IP packet.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T22:55:53.721Z

Reserved: 2021-04-15T00:00:00

Link: CVE-2021-31401

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-08-19T12:15:08.893

Modified: 2024-11-21T06:05:35.287

Link: CVE-2021-31401

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.