CVE-2021-3761
Summary
| CVE | CVE-2021-3761 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-09-09 14:15:00 UTC |
| Updated | 2022-04-04 13:41:00 UTC |
| Description | Any CA issuer in the RPKI can trick OctoRPKI prior to 1.3.0 into emitting an invalid VRP "MaxLength" value, causing RTR sessions to terminate. An attacker can use this to disable RPKI Origin Validation in a victim network (for example AS 13335 - Cloudflare) prior to launching a BGP hijack which during normal operations would be rejected as "RPKI invalid". Additionally, in certain deployments RTR session flapping in and of itself also could cause BGP routing churn, causing availability issues. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Debian -- Security Information -- DSA-5041-1 cfrpki |
DEBIAN |
www.debian.org |
|
| OctoRPKI lacks contextual out-of-bounds check when validating RPKI ROA maxLength values · Advisory · cloudflare/cfrpki · GitHub |
CONFIRM |
github.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
Vendor Comments And Credit
Discovery Credit
LEGACY: Job Snijders
Legacy QID Mappings
- 178993 Debian Security Update for cfrpki (DSA 5041-1)
- 183149 Debian Security Update for cfrpki (CVE-2021-3761)
- 980654 Go (go) Security Update for github.com/cloudflare/cfrpki (GHSA-c8xp-8mf3-62h9)