FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

routinator -- potential DOS attack

Affected packages
0.9.0 <= routinator < 0.11.3

Details

VuXML ID e4133d8b-ab33-451a-bc68-3719de73d54a
Discovery 2022-10-06
Entry 2022-10-07

Due to a mistake in error handling, data in RRDP snapshot and delta files that isn’t correctly base 64 encoded is treated as a fatal error and causes Routinator to exit. Worst case impact of this vulnerability is denial of service for the RPKI data that Routinator provides to routers. This may stop your network from validating route origins based on RPKI data. This vulnerability does not allow an attacker to manipulate RPKI data. We are not aware of exploitation of this vulnerability at this point in time. Starting with release 0.11.3, Routinator handles encoding errors by rejecting the snapshot or delta file and continuing with validation. In case of an invalid delta file, it will try using the snapshot instead. If a snapshot file is invalid, the update of the repository will fail and an update through rsync is attempted.

.

References

CVE Name CVE-2022-3029
URL https://nlnetlabs.nl/downloads/routinator/CVE-2022-3029.txt