CVE-2024-56375

EUVD-2024-53133
An integer underflow was discovered in Fort 1.6.3 and 1.6.4 before 1.6.5. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a Manifest RPKI object containing an empty fileList. Fort dereferences (and, shortly afterwards, writes to) this array during a shuffle attempt, before the validation that would normally reject it when empty. This out-of-bounds access is caused by an integer underflow that causes the surrounding loop to iterate infinitely. Because the product is permanently stuck attempting to overshuffle an array that doesn't actually exist, a crash is nearly guaranteed.
Wrap or Wraparound
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA-ADPADP
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 59%
Affected Products (NVD)
VendorProductVersion
nicmxfort_validator
1.6.3
nicmxfort_validator
1.6.4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
fort-validator
bookworm
1.5.4-1+deb12u1
not-affected
bullseye
1.5.3-1~deb11u1
not-affected
bullseye (security)
1.5.3-1~deb11u2
fixed
forky
1.6.7-1
fixed
sid
1.6.7-1
fixed
trixie
1.6.6-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
fort-validator
focal
not-affected
jammy
not-affected
noble
not-affected
oracular
ignored
plucky
not-affected