Attackers can create long chains of CAs that would lead to OctoRPKI exceeding its max iterations parameter. In consequence it would cause the program to crash, preventing it from finishing the validation and leading to a denial of service. Credits to Donika Mirdita and Haya Shulman - Fraunhofer SIT, ATHENE, who discovered and reported this vulnerability.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7146 | Attackers can create long chains of CAs that would lead to OctoRPKI exceeding its max iterations parameter. In consequence it would cause the program to crash, preventing it from finishing the validation and leading to a denial of service. Credits to Donika Mirdita and Haya Shulman - Fraunhofer SIT, ATHENE, who discovered and reported this vulnerability. |
Github GHSA |
GHSA-pmw9-567p-68pc | OctoRPKI crashes when max iterations is reached |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 05 May 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: cloudflare
Published:
Updated: 2025-05-05T19:19:50.911Z
Reserved: 2022-10-20T11:13:34.797Z
Link: CVE-2022-3616
Updated: 2024-08-03T01:14:03.299Z
Status : Modified
Published: 2022-10-28T07:15:16.557
Modified: 2024-11-21T07:19:53.173
Link: CVE-2022-3616
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA