CVE-2021-43083

Apache PLC4X - PLC4C (Only the C language implementation was effected) was vulnerable to an unsigned integer underflow flaw inside the tcp transport. Users should update to 0.9.1, which addresses this issue. However, in order to exploit this vulnerability, a user would have to actively connect to a mallicious device which could send a response with invalid content. Currently we consider the probability of this being exploited as quite minimal, however this could change in the future, especially with the industrial networks growing more and more together.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:plc4x:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:28

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2021/12/20/2 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2021/12/20/2 - Mailing List, Third Party Advisory
References () https://lists.apache.org/thread/jxx6qc84z60xbbhn6vp2s5qf09psrtc7 - Vendor Advisory () https://lists.apache.org/thread/jxx6qc84z60xbbhn6vp2s5qf09psrtc7 - Vendor Advisory

Information

Published : 2021-12-19 09:15

Updated : 2024-11-21 06:28


NVD link : CVE-2021-43083

Mitre link : CVE-2021-43083

CVE.ORG link : CVE-2021-43083


JSON object : View

Products Affected

apache

  • plc4x
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-191

Integer Underflow (Wrap or Wraparound)