Description
An issue was discovered in tcp_rcv() in nptcp.c in HCC embedded InterNiche 4.0.1. The TCP header processing code doesn't sanitize the value of the IP total length field (header length + data length). With a crafted IP packet, an integer overflow occurs whenever the value of the IP data length is calculated by subtracting the length of the header from the total length of the IP packet.
Published: 2021-08-19
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-18311 An issue was discovered in tcp_rcv() in nptcp.c in HCC embedded InterNiche 4.0.1. The TCP header processing code doesn't sanitize the value of the IP total length field (header length + data length). With a crafted IP packet, an integer overflow occurs whenever the value of the IP data length is calculated by subtracting the length of the header from the total length of the IP packet.
History

No history.

Subscriptions

Hcc-embedded Nichestack
Siemens Sentron 3wa Com190 Sentron 3wa Com190 Firmware Sentron 3wl Com35 Sentron 3wl Com35 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T22:55:53.721Z

Reserved: 2021-04-15T00:00:00.000Z

Link: CVE-2021-31401

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-08-19T12:15:08.893

Modified: 2024-11-21T06:05:35.287

Link: CVE-2021-31401

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses