Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-45239

Опубликовано: 24 авг. 2024
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.5

Описание

An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) an ROA or a Manifest containing a null eContent field. Fort dereferences the pointer without sanitizing it first. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing.

РелизСтатусПримечание
devel

not-affected

1.6.6-1
esm-apps/focal

released

1.2.0-1ubuntu0.1~esm1
esm-apps/jammy

released

1.5.3-1ubuntu0.1
esm-apps/noble

released

1.6.1-1ubuntu0.1~esm2
focal

ignored

end of standard support, was needs-triage
jammy

released

1.5.3-1ubuntu0.1
noble

needed

oracular

ignored

end of life, was needs-triage
plucky

not-affected

1.6.6-1
questing

not-affected

1.6.6-1

Показывать по

EPSS

Процентиль: 44%
0.00219
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
больше 1 года назад

An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) an ROA or a Manifest containing a null eContent field. Fort dereferences the pointer without sanitizing it first. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing.

CVSS3: 7.5
debian
больше 1 года назад

An issue was discovered in Fort before 1.6.3. A malicious RPKI reposit ...

CVSS3: 7.5
github
больше 1 года назад

An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) an ROA or a Manifest containing a null eContent field. Fort dereferences the pointer without sanitizing it first. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing.

EPSS

Процентиль: 44%
0.00219
Низкий

7.5 High

CVSS3

Уязвимость CVE-2024-45239