Incorrect Check of Function Return Value Affecting routinator package, versions <0.13.2


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.05% (17th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-RUST-ROUTINATOR-6282917
  • published 28 Feb 2024
  • disclosed 26 Feb 2024
  • credit Yohei Nishimura, Atsushi Enomoto, Ruka Miyachi

How to fix?

Upgrade routinator to version 0.13.2 or higher.

Overview

routinator is a Routinator is a full featured software package that runs as a service which periodically downloads and verifies RPKI data. The built-in HTTP server offers a user interface and API endpoints for various file formats, as well as logging, status and Prometheus metrics.

Affected versions of this package are vulnerable to Incorrect Check of Function Return Value due to a mistake in error checking, the application will terminate when an incoming connection is reset by the peer too quickly after opening. This abrupt termination can lead to a denial of service condition.

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
7.5 high
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    None
  • Integrity (I)
    None
  • Availability (A)
    High