Skip to content

Latest commit

 

History

History
executable file
·
40 lines (27 loc) · 1.33 KB

nichestack-icmp-payload-oob-r-xray-194053.md

File metadata and controls

executable file
·
40 lines (27 loc) · 1.33 KB
description title date_published last_updated xray_id vul_id cvss severity discovered_by type
CVE-2020-35684 High severity. NicheStack ICMP IP payload size read out of bounds
NicheStack ICMP payload OOB-R
2021-08-04
2021-08-04
XRAY-194053
CVE-2020-35684
7.5
high
Denys Vozniuk
vulnerability

Summary

NicheStack ICMP IP payload size read out of bounds

Component

InterNiche TCP/IP stack

Affected versions

InterNiche (, 4.3), fixed in 4.3

Description

NicheStack code that parses TCP packets relies on an unchecked value of the IP payload size (extracted from the IP header) to compute the length of the TCP payload within the TCP checksum computation function. When the IP payload size is set to be smaller than the size of the IP header, the TCP checksum computation function may read out of bounds. A low-impact write-out-of-bounds is also possible

PoC

No PoC is supplied for this issue

Vulnerability mitigations

No vulnerability mitigations are supplied for this issue

References

(JFrog) INFRA:HALT New Vulnerabilities Impacting OT and Critical Infrastructure

NVD