Логотип exploitDog
bind:CVE-2021-31401
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-31401

Количество 3

Количество 3

nvd логотип

CVE-2021-31401

больше 4 лет назад

An issue was discovered in tcp_rcv() in nptcp.c in HCC embedded InterNiche 4.0.1. The TCP header processing code doesn't sanitize the value of the IP total length field (header length + data length). With a crafted IP packet, an integer overflow occurs whenever the value of the IP data length is calculated by subtracting the length of the header from the total length of the IP packet.

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-jggm-qmcw-j5f5

больше 3 лет назад

An issue was discovered in tcp_rcv() in nptcp.c in HCC embedded InterNiche 4.0.1. The TCP header processing code doesn't sanitize the value of the IP total length field (header length + data length). With a crafted IP packet, an integer overflow occurs whenever the value of the IP data length is calculated by subtracting the length of the header from the total length of the IP packet.

EPSS: Низкий
fstec логотип

BDU:2021-04496

больше 4 лет назад

Уязвимость реализации протокола TCP стеков TCP/IP NicheLite и InterNiche, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-31401

An issue was discovered in tcp_rcv() in nptcp.c in HCC embedded InterNiche 4.0.1. The TCP header processing code doesn't sanitize the value of the IP total length field (header length + data length). With a crafted IP packet, an integer overflow occurs whenever the value of the IP data length is calculated by subtracting the length of the header from the total length of the IP packet.

CVSS3: 7.5
0%
Низкий
больше 4 лет назад
github логотип
GHSA-jggm-qmcw-j5f5

An issue was discovered in tcp_rcv() in nptcp.c in HCC embedded InterNiche 4.0.1. The TCP header processing code doesn't sanitize the value of the IP total length field (header length + data length). With a crafted IP packet, an integer overflow occurs whenever the value of the IP data length is calculated by subtracting the length of the header from the total length of the IP packet.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-04496

Уязвимость реализации протокола TCP стеков TCP/IP NicheLite и InterNiche, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
больше 4 лет назад

Уязвимостей на страницу