We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-56375



Description

An integer underflow was discovered in Fort 1.6.3 and 1.6.4 before 1.6.5. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a Manifest RPKI object containing an empty fileList. Fort dereferences (and, shortly afterwards, writes to) this array during a shuffle attempt, before the validation that would normally reject it when empty. This out-of-bounds access is caused by an integer underflow that causes the surrounding loop to iterate infinitely. Because the product is permanently stuck attempting to overshuffle an array that doesn't actually exist, a crash is nearly guaranteed.

Reserved 2024-12-22 | Published 2024-12-22 | Updated 2025-01-06 | Assigner mitre

Problem types

CWE-191 Integer Underflow (Wrap or Wraparound)

Product status

Default status
unaffected

1.6.3 before 1.6.5
affected

References

nicmx.github.io/FORT-validator/CVE.html

github.com/NICMx/FORT-validator/issues/154

cve.org (CVE-2024-56375)

nvd.nist.gov (CVE-2024-56375)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-56375

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.