mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 10:41:43 +00:00
19 lines
954 B
Markdown
19 lines
954 B
Markdown
![]() |
### [CVE-2021-31401](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31401)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
An issue was discovered in tcp_rcv() in nptcp.c in HCC embedded InterNiche 4.0.1. The TCP header processing code doesn't sanitize the value of the IP total length field (header length + data length). With a crafted IP packet, an integer overflow occurs whenever the value of the IP data length is calculated by subtracting the length of the header from the total length of the IP packet.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/
|
||
|
- https://www.kb.cert.org/vuls/id/608209
|
||
|
|
||
|
#### Github
|
||
|
No PoCs found on GitHub currently.
|
||
|
|