CVE-2021-31401
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
19/08/2021
Last modified:
26/08/2021
Description
An issue was discovered in tcp_rcv() in nptcp.c in HCC embedded InterNiche 4.0.1. The TCP header processing code doesn't sanitize the value of the IP total length field (header length + data length). With a crafted IP packet, an integer overflow occurs whenever the value of the IP data length is calculated by subtracting the length of the header from the total length of the IP packet.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:hcc-embedded:nichestack:*:*:*:*:*:*:*:* | 4.3 (excluding) | |
| cpe:2.3:o:siemens:sentron_3wl_com35_firmware:*:*:*:*:*:*:*:* | 1.2.0 (excluding) | |
| cpe:2.3:h:siemens:sentron_3wl_com35:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:siemens:sentron_3wa_com190_firmware:*:*:*:*:*:*:*:* | 2.0.0 (excluding) | |
| cpe:2.3:h:siemens:sentron_3wa_com190:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



