An issue was discovered in HCC Embedded InterNiche NicheStack through 4.3. The tfshnd():tftpsrv.c TFTP packet processing function doesn't ensure that a filename is adequately '\0' terminated; therefore, a subsequent call to strlen for the filename might read out of bounds of the protocol packet buffer (if no '\0' byte exists within a reasonable range).
References
Link | Resource |
---|---|
https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ | Mitigation Third Party Advisory |
https://www.hcc-embedded.com/about/about-interniche | Product |
https://www.kb.cert.org/vuls/id/608209 | Third Party Advisory US Government Resource |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-08-19T11:09:58
Updated: 2021-08-19T11:10:24
Reserved: 2021-07-16T00:00:00
Link: CVE-2021-36762
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-08-19T12:15:09.133
Modified: 2023-08-08T14:21:49.707
Link: CVE-2021-36762
JSON object: View
Redhat Information
No data.
CWE