Attackers can create long chains of CAs that would lead to OctoRPKI exceeding its max iterations parameter. In consequence it would cause the program to crash, preventing it from finishing the validation and leading to a denial of service. Credits to Donika Mirdita and Haya Shulman - Fraunhofer SIT, ATHENE, who discovered and reported this vulnerability.
The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product.
The product performs an iteration or loop without sufficiently limiting the number of times that the loop is executed.
Link | Tags |
---|---|
https://github.com/cloudflare/cfrpki/security/advisories/GHSA-pmw9-567p-68pc | third party advisory |