Lucene search

K

6 matches found

CVE
CVE
added 2021/08/19 11:15 a.m.60 views

CVE-2021-31228

An issue was discovered in HCC embedded InterNiche 4.0.1. This vulnerability allows the attacker to predict a DNS query's source port in order to send forged DNS response packets that will be accepted as valid answers to the DNS client's requests (without sniffing the specific request). Data is pre...

7.5CVSS7.8AI score0.0028EPSS
CVE
CVE
added 2021/08/19 12:15 p.m.58 views

CVE-2021-27565

The web server in InterNiche NicheStack through 4.0.1 allows remote attackers to cause a denial of service (infinite loop and networking outage) via an unexpected valid HTTP request such as OPTIONS. This occurs because the HTTP request handler enters a miscoded wbs_loop() debugger hook.

7.5CVSS7.7AI score0.02416EPSS
CVE
CVE
added 2021/08/19 11:15 a.m.53 views

CVE-2021-31227

An issue was discovered in HCC embedded InterNiche 4.0.1. A potential heap buffer overflow exists in the code that parses the HTTP POST request, due to an incorrect signed integer comparison. This vulnerability requires the attacker to send a malformed HTTP packet with a negative Content-Length, wh...

7.5CVSS8.2AI score0.00217EPSS
CVE
CVE
added 2021/08/19 11:15 a.m.52 views

CVE-2021-31400

An issue was discovered in tcp_pulloutofband() in tcp_in.c in HCC embedded InterNiche 4.0.1. The TCP out-of-band urgent-data processing function invokes a panic function if the pointer to the end of the out-of-band data points outside of the TCP segment's data. If the panic function hadn't a trap i...

7.5CVSS7.8AI score0.00408EPSS
CVE
CVE
added 2021/08/19 12:15 p.m.50 views

CVE-2021-31401

An issue was discovered in tcp_rcv() in nptcp.c in HCC embedded InterNiche 4.0.1. The TCP header processing code doesn't sanitize the value of the IP total length field (header length + data length). With a crafted IP packet, an integer overflow occurs whenever the value of the IP data length is ca...

7.5CVSS8.7AI score0.00713EPSS
CVE
CVE
added 2021/08/19 12:15 p.m.46 views

CVE-2021-36762

An issue was discovered in HCC Embedded InterNiche NicheStack through 4.3. The tfshnd():tftpsrv.c TFTP packet processing function doesn't ensure that a filename is adequately '\0' terminated; therefore, a subsequent call to strlen for the filename might read out of bounds of the protocol packet buf...

7.8CVSS7.9AI score0.00343EPSS