NicheStack TCP header IP length integer overflow leads to DoS
InterNiche (, 4.3), fixed in 4.3
NicheStack TCP header processing code doesn’t sanitize the length of the IP length (header + data). With a crafted IP packet an integer overflow would occur whenever the length of the IP data is calculated by subtracting the length of the header from the length of the total IP packet
No PoC is supplied for this issue
No vulnerability mitigations are supplied for this issue
(JFrog) INFRA:HALT New Vulnerabilities Impacting OT and Critical Infrastructure