In NLnet Labs Routinator 0.9.0 up to and including 0.11.2, due to a mistake in error handling, data in RRDP snapshot and delta files that isn’t correctly base 64 encoded is treated as a fatal error and causes Routinator to exit. Worst case impact of this vulnerability is denial of service for the RPKI data that Routinator provides to routers. This may stop your network from validating route origins based on RPKI data. This vulnerability does not allow an attacker to manipulate RPKI data.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-6868 | In NLnet Labs Routinator 0.9.0 up to and including 0.11.2, due to a mistake in error handling, data in RRDP snapshot and delta files that isn’t correctly base 64 encoded is treated as a fatal error and causes Routinator to exit. Worst case impact of this vulnerability is denial of service for the RPKI data that Routinator provides to routers. This may stop your network from validating route origins based on RPKI data. This vulnerability does not allow an attacker to manipulate RPKI data. |
Github GHSA |
GHSA-m4vx-ccrf-w399 | NLnet Labs Routinator has Reachable Assertion vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: NLnet Labs
Published:
Updated: 2024-09-16T17:49:23.765Z
Reserved: 2022-08-29T00:00:00
Link: CVE-2022-3029
No data.
Status : Modified
Published: 2022-09-13T16:15:09.230
Modified: 2024-11-21T07:18:40.107
Link: CVE-2022-3029
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA