Логотип exploitDog
bind:CVE-2024-45235
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-45235

Количество 4

Количество 4

ubuntu логотип

CVE-2024-45235

больше 1 года назад

An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a resource certificate containing an Authority Key Identifier extension that lacks the keyIdentifier field. Fort references this pointer without sanitizing it first. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2024-45235

больше 1 года назад

An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a resource certificate containing an Authority Key Identifier extension that lacks the keyIdentifier field. Fort references this pointer without sanitizing it first. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2024-45235

больше 1 года назад

An issue was discovered in Fort before 1.6.3. A malicious RPKI reposit ...

CVSS3: 7.5
EPSS: Низкий
github логотип

GHSA-2wr3-xjqg-6q48

больше 1 года назад

An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a resource certificate containing an Authority Key Identifier extension that lacks the keyIdentifier field. Fort references this pointer without sanitizing it first. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing.

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-45235

An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a resource certificate containing an Authority Key Identifier extension that lacks the keyIdentifier field. Fort references this pointer without sanitizing it first. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing.

CVSS3: 7.5
1%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-45235

An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a resource certificate containing an Authority Key Identifier extension that lacks the keyIdentifier field. Fort references this pointer without sanitizing it first. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing.

CVSS3: 7.5
1%
Низкий
больше 1 года назад
debian логотип
CVE-2024-45235

An issue was discovered in Fort before 1.6.3. A malicious RPKI reposit ...

CVSS3: 7.5
1%
Низкий
больше 1 года назад
github логотип
GHSA-2wr3-xjqg-6q48

An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a resource certificate containing an Authority Key Identifier extension that lacks the keyIdentifier field. Fort references this pointer without sanitizing it first. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing.

CVSS3: 7.5
1%
Низкий
больше 1 года назад

Уязвимостей на страницу