cvelist/2023/39xxx/CVE-2023-39915.json
2024-09-11 16:00:36 +00:00

115 lines
4.0 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-39915",
"ASSIGNER": "sep@nlnetlabs.nl",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "NLnet Labs' Routinator up to and including version 0.12.1 may crash when trying to parse certain malformed RPKI objects. This is due to insufficient input checking in the bcder library covered by CVE-2023-39914."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-232: Improper Handling of Undefined Values",
"cweId": "CWE-232"
},
{
"lang": "eng",
"value": "CWE-240: Improper Handling of Inconsistent Structural Elements",
"cweId": "CWE-240"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "NLnet Labs",
"product": {
"product_data": [
{
"product_name": "Routinator",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"lessThan": "0.12.2",
"status": "affected",
"version": "*",
"versionType": "semver"
},
{
"lessThan": "*",
"status": "unaffected",
"version": "0.12.2",
"versionType": "semver"
}
],
"defaultStatus": "unaffected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://nlnetlabs.nl/downloads/routinator/CVE-2023-39915.txt",
"refsource": "MISC",
"name": "https://nlnetlabs.nl/downloads/routinator/CVE-2023-39915.txt"
}
]
},
"solution": [
{
"lang": "en",
"value": "This issue is fixed in 0.12.2 and all later versions."
}
],
"credits": [
{
"lang": "en",
"value": "Haya Shulman"
},
{
"lang": "en",
"value": "Donika Mirdita"
},
{
"lang": "en",
"value": "Niklas Vogel"
}
],
"impact": {
"cvss": [
{
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
]
}
}