Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jggm-qmcw-j5f5

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

An issue was discovered in tcp_rcv() in nptcp.c in HCC embedded InterNiche 4.0.1. The TCP header processing code doesn't sanitize the value of the IP total length field (header length + data length). With a crafted IP packet, an integer overflow occurs whenever the value of the IP data length is calculated by subtracting the length of the header from the total length of the IP packet.

An issue was discovered in tcp_rcv() in nptcp.c in HCC embedded InterNiche 4.0.1. The TCP header processing code doesn't sanitize the value of the IP total length field (header length + data length). With a crafted IP packet, an integer overflow occurs whenever the value of the IP data length is calculated by subtracting the length of the header from the total length of the IP packet.

EPSS

Процентиль: 65%
0.00498
Низкий

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 7.5
nvd
больше 4 лет назад

An issue was discovered in tcp_rcv() in nptcp.c in HCC embedded InterNiche 4.0.1. The TCP header processing code doesn't sanitize the value of the IP total length field (header length + data length). With a crafted IP packet, an integer overflow occurs whenever the value of the IP data length is calculated by subtracting the length of the header from the total length of the IP packet.

CVSS3: 7.5
fstec
больше 4 лет назад

Уязвимость реализации протокола TCP стеков TCP/IP NicheLite и InterNiche, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 65%
0.00498
Низкий

Дефекты

CWE-20