CVE-2021-3909

OctoRPKI does not limit the length of a connection, allowing for a slowloris DOS attack to take place which makes OctoRPKI wait forever. Specifically, the repository that OctoRPKI sends HTTP requests to will keep the connection open for a day before a response is returned, but does keep drip feeding new bytes to keep the connection alive.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cloudflare:octorpki:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:22

Type Values Removed Values Added
References () https://github.com/cloudflare/cfrpki/security/advisories/GHSA-8cvr-4rrf-f244 - Third Party Advisory () https://github.com/cloudflare/cfrpki/security/advisories/GHSA-8cvr-4rrf-f244 - Third Party Advisory
References () https://www.debian.org/security/2021/dsa-5033 - Third Party Advisory () https://www.debian.org/security/2021/dsa-5033 - Third Party Advisory
References () https://www.debian.org/security/2022/dsa-5041 - Third Party Advisory () https://www.debian.org/security/2022/dsa-5041 - Third Party Advisory
CVSS v2 : 5.0
v3 : 7.5
v2 : 5.0
v3 : 4.4

Information

Published : 2021-11-11 22:15

Updated : 2024-11-21 06:22


NVD link : CVE-2021-3909

Mitre link : CVE-2021-3909

CVE.ORG link : CVE-2021-3909


JSON object : View

Products Affected

cloudflare

  • octorpki

debian

  • debian_linux
CWE
CWE-400

Uncontrolled Resource Consumption