An issue was discovered in NLnet Labs Routinator 0.1.0 through 0.7.1. It allows remote attackers to bypass intended access restrictions or to cause a denial of service on dependent routing systems by strategically withholding RPKI Route Origin Authorisation ".roa" files or X509 Certificate Revocation List files from the RPKI relying party's view.
The product does not validate, or incorrectly validates, a certificate.
Link | Tags |
---|---|
https://github.com/NLnetLabs/routinator/issues/319 | issue tracking exploit third party advisory |
https://github.com/NLnetLabs/routinator/releases/tag/v0.8.0 | third party advisory release notes |