InterNiche Security Vulnerabilities

Advisory ID: HCCSEC-000007

Publish Date: 2021-05-28

Last Updated: 2021-06-15

Revision: 1.1

Summary

Routine that parses DNS domain names has no checks on whether a domain name compression pointer is pointing within the bounds of the packet (e.g., forward compression pointer jumps are allowed), which leads to OOB-R and Denial-of-Service as a consequence.

HCC is recommending customers with affected product versions to update to the latest release.

Affected Products

Security Notices are being issued for the following products:

Product Name Affected Version Security Notice Last Updated
InterNiche Stack,
also NicheLite
All before v4.3
(Package: in_common - v1.15)
Contact HCC Security Team 2021-06-04

Risk Assessment

The risks for these vulnerabilities are rated from Low to High. Refer to the product Security Notices for additional statements regarding risk.

Mitigation / Recommended Action

HCC has fixed the issue in release v4.3 (Package: in_common - v1.20) of the affected software. Customers are advised to update their software to version v4.3 (Package: in_common - v1.20) or above. Customers are advised to review the product Security Notice. For additional information, contact the HCC Security Team.

External References

N/A

Related CVEs / CWEs / Advisories

CVE-2020-25767

Page Revision History

Version Date Description
1.1 2021-06-15 Name and version added of fixed Package
1.0 2021-05-28 Initial Version