{ "schema_version": "1.4.0", "id": "GHSA-xj6g-7vq6-3mcm", "modified": "2023-08-08T15:31:20Z", "published": "2022-05-24T19:11:41Z", "aliases": [ "CVE-2021-36762" ], "details": "An issue was discovered in HCC Embedded InterNiche NicheStack through 4.3. The tfshnd():tftpsrv.c TFTP packet processing function doesn't ensure that a filename is adequately '\\0' terminated; therefore, a subsequent call to strlen for the filename might read out of bounds of the protocol packet buffer (if no '\\0' byte exists within a reasonable range).", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36762" }, { "type": "WEB", "url": "https://www.forescout.com/blog/new-critical-operational-technology-vulnerabilities-found-on-nichestack" }, { "type": "WEB", "url": "https://www.hcc-embedded.com/about/about-interniche" }, { "type": "WEB", "url": "https://www.kb.cert.org/vuls/id/608209" } ], "database_specific": { "cwe_ids": [ "CWE-273" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-08-19T12:15:00Z" } }