Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-45237

Опубликовано: 24 авг. 2024
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 9.8

Описание

An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a resource certificate containing a Key Usage extension composed of more than two bytes of data. Fort writes this string into a 2-byte buffer without properly sanitizing its length, leading to a buffer overflow.

РелизСтатусПримечание
devel

not-affected

1.6.6-1
esm-apps/focal

released

1.2.0-1ubuntu0.1~esm1
esm-apps/jammy

released

1.5.3-1ubuntu0.1
esm-apps/noble

released

1.6.1-1ubuntu0.1~esm2
focal

ignored

end of standard support, was needs-triage
jammy

released

1.5.3-1ubuntu0.1
noble

needed

oracular

ignored

end of life, was needs-triage
plucky

not-affected

1.6.6-1
questing

not-affected

1.6.6-1

Показывать по

EPSS

Процентиль: 50%
0.00269
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
больше 1 года назад

An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a resource certificate containing a Key Usage extension composed of more than two bytes of data. Fort writes this string into a 2-byte buffer without properly sanitizing its length, leading to a buffer overflow.

CVSS3: 9.8
debian
больше 1 года назад

An issue was discovered in Fort before 1.6.3. A malicious RPKI reposit ...

CVSS3: 9.8
github
больше 1 года назад

An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a resource certificate containing a Key Usage extension composed of more than two bytes of data. Fort writes this string into a 2-byte buffer without properly sanitizing its length, leading to a buffer overflow.

CVSS3: 9.8
fstec
больше 1 года назад

Уязвимость валидатора NICMx Fort, связанная с переполнением буфера в стеке, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 50%
0.00269
Низкий

9.8 Critical

CVSS3