An issue was discovered in HCC Nichestack 3.0. The code that parses ICMP packets relies on an unchecked value of the IP payload size (extracted from the IP header) to compute the ICMP checksum. When the IP payload size is set to be smaller than the size of the IP header, the ICMP checksum computation function may read out of bounds, causing a Denial-of-Service.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://www.hcc-embedded.com | product |
https://cert-portal.siemens.com/productcert/pdf/ssa-789208.pdf | mitigation third party advisory |
https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack/ | mitigation third party advisory |
https://www.kb.cert.org/vuls/id/608209 | third party advisory us government resource |