CVE-2022-3029

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-3029
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-3029.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-3029
Aliases
Withdrawn
2024-05-15T05:32:07.106661Z
Published
2022-09-13T16:15:09Z
Modified
2023-11-29T09:39:44.044597Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In NLnet Labs Routinator 0.9.0 up to and including 0.11.2, due to a mistake in error handling, data in RRDP snapshot and delta files that isn’t correctly base 64 encoded is treated as a fatal error and causes Routinator to exit. Worst case impact of this vulnerability is denial of service for the RPKI data that Routinator provides to routers. This may stop your network from validating route origins based on RPKI data. This vulnerability does not allow an attacker to manipulate RPKI data.

References

Affected packages

Git / github.com/nlnetlabs/routinator

Affected ranges

Type
GIT
Repo
https://github.com/nlnetlabs/routinator
Events

Affected versions

0.*

0.9.0

v0.*

v0.10.0
v0.10.0-rc1
v0.10.0-rc2
v0.10.0-rc3
v0.10.1
v0.10.1-rc1
v0.10.1-rc2
v0.10.1-rc3
v0.10.2
v0.11.0
v0.11.0-rc1
v0.11.0-rc2
v0.11.1
v0.11.1-rc1
v0.11.2
v0.12.0
v0.12.0-rc1
v0.12.1
v0.12.1-rc1
v0.12.1-rc2
v0.12.2
v0.13.0
v0.13.0-rc1
v0.13.0-rc2
v0.9.0