logo

CVE-2021-43174 routinator

Package

Manager: cargo
Name: routinator
Vulnerable Version: >=0.9.0 <0.10.2

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00715 pctl0.71496

Details

Memory exhaustion in routinator NLnet Labs Routinator versions 0.9.0 up to and including 0.10.1, support the gzip transfer encoding when querying RRDP repositories. This encoding can be used by an RRDP repository to cause an out-of-memory crash in these versions of Routinator. RRDP uses XML which allows arbitrary amounts of white space in the encoded data. The gzip scheme compresses such white space extremely well, leading to very small compressed files that become huge when being decompressed for further processing, big enough that Routinator runs out of memory when parsing input data waiting for the next XML element.

Metadata

Created: 2021-11-11T00:55:08Z
Modified: 2021-11-15T14:48:03Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/11/GHSA-6mv9-qcx2-3hh3/GHSA-6mv9-qcx2-3hh3.json
CWE IDs: ["CWE-787"]
Alternative ID: GHSA-6mv9-qcx2-3hh3
Finding: F111
Auto approve: 1