From 8f3edcdf139aa823e1f17aa15b337ab92436ebf7 Mon Sep 17 00:00:00 2001 From: David Haynes Date: Fri, 3 Sep 2021 09:39:22 -0700 Subject: [PATCH] CVE-2021-3761: Publish full disclosure --- 2021/3xxx/CVE-2021-3761.json | 92 +++++++++++++++++++++++++++++++++--- 1 file changed, 86 insertions(+), 6 deletions(-) diff --git a/2021/3xxx/CVE-2021-3761.json b/2021/3xxx/CVE-2021-3761.json index e0659a4867f..702d547806a 100644 --- a/2021/3xxx/CVE-2021-3761.json +++ b/2021/3xxx/CVE-2021-3761.json @@ -1,18 +1,98 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "cna@cloudflare.com", + "DATE_PUBLIC": "2021-09-03T16:28:00.000Z", "ID": "CVE-2021-3761", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "OctoRPKI lacks contextual out-of-bounds check when validating RPKI ROA maxLength values" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "octorpki", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "1.3.0" + } + ] + } + } + ] + }, + "vendor_name": "Cloudflare" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "Job Snijders" + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Any CA issuer in the RPKI can trick OctoRPKI prior to 1.3.0 into emitting an invalid VRP \"MaxLength\" value, causing RTR sessions to terminate.\n\nAn attacker can use this to disable RPKI Origin Validation in a victim network (for example AS 13335 - Cloudflare) prior to launching a BGP hijack which during normal operations would be rejected as \"RPKI invalid\". Additionally, in certain deployments RTR session flapping in and of itself also could cause BGP routing churn, causing availability issues.\n" } ] + }, + "generator": { + "engine": "Vulnogram 0.0.9" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Missing out of bounds check" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://github.com/cloudflare/cfrpki/security/advisories/GHSA-c8xp-8mf3-62h9" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "Upgrade to 1.3.0" + } + ], + "source": { + "discovery": "EXTERNAL" } } \ No newline at end of file