Apache PLC4X - PLC4C (Only the C language implementation was effected) was vulnerable to an unsigned integer underflow flaw inside the tcp transport. Users should update to 0.9.1, which addresses this issue. However, in order to exploit this vulnerability, a user would have to actively connect to a mallicious device which could send a response with invalid content. Currently we consider the probability of this being exploited as quite minimal, however this could change in the future, especially with the industrial networks growing more and more together.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2021/12/20/2 | Mailing List Third Party Advisory |
https://lists.apache.org/thread/jxx6qc84z60xbbhn6vp2s5qf09psrtc7 | Vendor Advisory |
http://www.openwall.com/lists/oss-security/2021/12/20/2 | Mailing List Third Party Advisory |
https://lists.apache.org/thread/jxx6qc84z60xbbhn6vp2s5qf09psrtc7 | Vendor Advisory |
Configurations
History
21 Nov 2024, 06:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2021/12/20/2 - Mailing List, Third Party Advisory | |
References | () https://lists.apache.org/thread/jxx6qc84z60xbbhn6vp2s5qf09psrtc7 - Vendor Advisory |
Information
Published : 2021-12-19 09:15
Updated : 2024-11-21 06:28
NVD link : CVE-2021-43083
Mitre link : CVE-2021-43083
CVE.ORG link : CVE-2021-43083
JSON object : View
Products Affected
apache
- plc4x