ghsa-m4vx-ccrf-w399
Vulnerability from github
Published
2022-09-14 00:00
Modified
2022-09-20 18:15
Severity ?
VLAI Severity ?
Summary
NLnet Labs Routinator has Reachable Assertion vulnerability
Details
In NLnet Labs Routinator 0.9.0 up to and including 0.11.2, due to a mistake in error handling, data in RRDP snapshot and delta files which are not correctly base 64 encoded are treated as a fatal error and causes Routinator to exit. Worst case impact of this vulnerability is denial of service for the RPKI data that Routinator provides to routers. This may stop your network from validating route origins based on RPKI data. This vulnerability does not allow an attacker to manipulate RPKI data.
{ "affected": [ { "package": { "ecosystem": "crates.io", "name": "routinator" }, "ranges": [ { "events": [ { "introduced": "0.9.0" }, { "fixed": "0.11.3" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2022-3029" ], "database_specific": { "cwe_ids": [ "CWE-617" ], "github_reviewed": true, "github_reviewed_at": "2022-09-20T18:15:00Z", "nvd_published_at": "2022-09-13T16:15:00Z", "severity": "HIGH" }, "details": "In NLnet Labs Routinator 0.9.0 up to and including 0.11.2, due to a mistake in error handling, data in RRDP snapshot and delta files which are not correctly base 64 encoded are treated as a fatal error and causes Routinator to exit. Worst case impact of this vulnerability is denial of service for the RPKI data that Routinator provides to routers. This may stop your network from validating route origins based on RPKI data. This vulnerability does not allow an attacker to manipulate RPKI data.", "id": "GHSA-m4vx-ccrf-w399", "modified": "2022-09-20T18:15:00Z", "published": "2022-09-14T00:00:43Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3029" }, { "type": "WEB", "url": "https://github.com/NLnetLabs/routinator/pull/781/commits/c2e2476f28f09ea5ffb22d172d84fb4f8384d496" }, { "type": "PACKAGE", "url": "https://github.com/NLnetLabs/routinator" }, { "type": "WEB", "url": "https://github.com/NLnetLabs/routinator/releases/tag/v0.11.3" }, { "type": "WEB", "url": "https://www.nlnetlabs.nl/downloads/routinator/CVE-2022-3029.txt" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ], "summary": "NLnet Labs Routinator has Reachable Assertion vulnerability" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…