Описание
An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a resource certificate containing a Key Usage extension composed of more than two bytes of data. Fort writes this string into a 2-byte buffer without properly sanitizing its length, leading to a buffer overflow.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 1.6.6-1 |
| esm-apps/focal | released | 1.2.0-1ubuntu0.1~esm1 |
| esm-apps/jammy | released | 1.5.3-1ubuntu0.1 |
| esm-apps/noble | released | 1.6.1-1ubuntu0.1~esm2 |
| focal | ignored | end of standard support, was needs-triage |
| jammy | released | 1.5.3-1ubuntu0.1 |
| noble | needed | |
| oracular | ignored | end of life, was needs-triage |
| plucky | not-affected | 1.6.6-1 |
| questing | not-affected | 1.6.6-1 |
Показывать по
EPSS
9.8 Critical
CVSS3
Связанные уязвимости
An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a resource certificate containing a Key Usage extension composed of more than two bytes of data. Fort writes this string into a 2-byte buffer without properly sanitizing its length, leading to a buffer overflow.
An issue was discovered in Fort before 1.6.3. A malicious RPKI reposit ...
An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a resource certificate containing a Key Usage extension composed of more than two bytes of data. Fort writes this string into a 2-byte buffer without properly sanitizing its length, leading to a buffer overflow.
Уязвимость валидатора NICMx Fort, связанная с переполнением буфера в стеке, позволяющая нарушителю выполнить произвольный код
EPSS
9.8 Critical
CVSS3