Product Security Advisory HCCSEC-000015
InterNiche Security Vulnerabilities
Advisory ID: HCCSEC-000015
Publish Date: 2021-05-28
Last Updated: 2021-06-15
The TCP header processing code doesn't sanitize the length of the IP length (header + data). With a crafted IP packet an integer overflow would occur whenever the length of the IP data is calculated by substracting the length of the header from the length of the total IP packet. This bug, depending on the treatment on the application layer, it might present an impact.
HCC is recommending customers with affected product versions to update to the latest release.
Security Notices are being issued for the following products:
|Product Name||Affected Version||Security Notice||Last Updated|
|InterNiche Stack, |
|All before v4.3 |
(Package: in_tcp - v1.9)
|Contact HCC Security Team||2021-06-04|
The risks for these vulnerabilities are rated from Low to High. Refer to the product Security Notices for additional statements regarding risk.
Mitigation / Recommended Action
HCC has fixed the issue in release v4.3 (Package: in_tcp - v1.12) of the affected software. Customers are advised to update their software to version v4.3 (Package: in_tcp - v1.12) or above. Customers are advised to review the product Security Notice. For additional information, contact the HCC Security Team.
Related CVEs / CWEs / Advisories
Page Revision History
|1.1||2021-06-15||Name and version added of fixed Package|