CVE-2022-3616

Attackers can create long chains of CAs that would lead to OctoRPKI exceeding its max iterations parameter. In consequence it would cause the program to crash, preventing it from finishing the validation and leading to a denial of service. Credits to Donika Mirdita and Haya Shulman - Fraunhofer SIT, ATHENE, who discovered and reported this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cloudflare:octorpki:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:19

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 5.4
References () https://github.com/cloudflare/cfrpki/security/advisories/GHSA-pmw9-567p-68pc - Third Party Advisory () https://github.com/cloudflare/cfrpki/security/advisories/GHSA-pmw9-567p-68pc - Third Party Advisory

07 Nov 2023, 03:51

Type Values Removed Values Added
Summary Attackers can create long chains of CAs that would lead to OctoRPKI exceeding its max iterations parameter. In consequence it would cause the program to crash, preventing it from finishing the validation and leading to a denial of service. Credits to Donika Mirdita and Haya Shulman - Fraunhofer SIT, ATHENE, who discovered and reported this vulnerability. Attackers can create long chains of CAs that would lead to OctoRPKI exceeding its max iterations parameter. In consequence it would cause the program to crash, preventing it from finishing the validation and leading to a denial of service. Credits to Donika Mirdita and Haya Shulman - Fraunhofer SIT, ATHENE, who discovered and reported this vulnerability.

Information

Published : 2022-10-28 07:15

Updated : 2024-11-21 07:19


NVD link : CVE-2022-3616

Mitre link : CVE-2022-3616

CVE.ORG link : CVE-2022-3616


JSON object : View

Products Affected

cloudflare

  • octorpki
CWE
CWE-754

Improper Check for Unusual or Exceptional Conditions

CWE-834

Excessive Iteration