Attackers can create long chains of CAs that would lead to OctoRPKI exceeding its max iterations parameter. In consequence it would cause the program to crash, preventing it from finishing the validation and leading to a denial of service. Credits to Donika Mirdita and Haya Shulman - Fraunhofer SIT, ATHENE, who discovered and reported this vulnerability.
References
Link | Resource |
---|---|
https://github.com/cloudflare/cfrpki/security/advisories/GHSA-pmw9-567p-68pc | Third Party Advisory |
https://github.com/cloudflare/cfrpki/security/advisories/GHSA-pmw9-567p-68pc | Third Party Advisory |
Configurations
History
21 Nov 2024, 07:19
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
References | () https://github.com/cloudflare/cfrpki/security/advisories/GHSA-pmw9-567p-68pc - Third Party Advisory |
07 Nov 2023, 03:51
Type | Values Removed | Values Added |
---|---|---|
Summary | Attackers can create long chains of CAs that would lead to OctoRPKI exceeding its max iterations parameter. In consequence it would cause the program to crash, preventing it from finishing the validation and leading to a denial of service. Credits to Donika Mirdita and Haya Shulman - Fraunhofer SIT, ATHENE, who discovered and reported this vulnerability. |
Information
Published : 2022-10-28 07:15
Updated : 2024-11-21 07:19
NVD link : CVE-2022-3616
Mitre link : CVE-2022-3616
CVE.ORG link : CVE-2022-3616
JSON object : View
Products Affected
cloudflare
- octorpki