CVE-2024-56375

An integer underflow was discovered in Fort 1.6.3 and 1.6.4 before 1.6.5. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a Manifest RPKI object containing an empty fileList. Fort dereferences (and, shortly afterwards, writes to) this array during a shuffle attempt, before the validation that would normally reject it when empty. This out-of-bounds access is caused by an integer underflow that causes the surrounding loop to iterate infinitely. Because the product is permanently stuck attempting to overshuffle an array that doesn't actually exist, a crash is nearly guaranteed.
Wrap or Wraparound
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
mitreCNA
---
---
CISA-ADPADP
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 23%
VendorProductVersion
nicmxfort_validator
1.6.3
nicmxfort_validator
1.6.4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
fort-validator
bullseye
1.5.3-1~deb11u1
not-affected
bookworm
1.5.4-1
not-affected
bullseye (security)
1.5.3-1~deb11u2
fixed
sid
1.6.6-1
fixed
trixie
1.6.6-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
fort-validator
plucky
not-affected
oracular
needs-triage
noble
needs-triage
jammy
needs-triage
focal
needs-triage