Resource Exhaustion Affecting fort-validator Open this link in a new tab package, versions <1.5.3-1
Attack Complexity
Low
Availability
High
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications-
snyk-id
SNYK-DEBIAN12-FORTVALIDATOR-2327130
-
published
12 Nov 2021
-
disclosed
11 Nov 2021
Introduced: 11 Nov 2021
CVE-2021-3909 Open this link in a new tabHow to fix?
Upgrade Debian:12
fort-validator
to version 1.5.3-1 or higher.
NVD Description
Note: Versions mentioned in the description apply to the upstream fort-validator
package.
See How to fix?
for Debian:12
relevant versions.
OctoRPKI does not limit the length of a connection, allowing for a slowloris DOS attack to take place which makes OctoRPKI wait forever. Specifically, the repository that OctoRPKI sends HTTP requests to will keep the connection open for a day before a response is returned, but does keep drip feeding new bytes to keep the connection alive.