{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-1622","assignerOrgId":"206fc3a0-e175-490b-9eaa-a5738056c9f6","state":"PUBLISHED","assignerShortName":"NLnet Labs","dateReserved":"2024-02-19T11:06:37.459Z","datePublished":"2024-02-26T13:35:51.909Z","dateUpdated":"2025-02-13T17:32:19.432Z"},"containers":{"cna":{"title":"Routinator terminates when RTR connection is reset too quickly after opening","datePublic":"2024-02-26T00:00:00.000Z","affected":[{"vendor":"NLnet Labs","product":"Routinator","versions":[{"version":"0.13.2","status":"unaffected","lessThan":"*","versionType":"semver"}],"defaultStatus":"affected"}],"descriptions":[{"lang":"en","value":"Due to a mistake in error checking, Routinator will terminate when an incoming RTR connection is reset by the peer too quickly after opening."}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}}],"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-253","description":"CWE-253 Incorrect Check of Function Return Value","type":"CWE"}]}],"solutions":[{"lang":"en","value":"This issue is fixed in 0.13.2 and all later versions."}],"timeline":[{"time":"2024-02-13T00:00:00.000Z","lang":"en","value":"Issue reported"},{"time":"2024-02-26T00:00:00.000Z","lang":"en","value":"Fixes released"}],"credits":[{"lang":"en","value":"Yohei Nishimura, Atsushi Enomoto, Ruka Miyachi; Internet Multifeed Co., Japan","type":"finder"}],"references":[{"url":"https://www.nlnetlabs.nl/downloads/routinator/CVE-2024-1622.txt","tags":["vendor-advisory"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K52QRRYBHLP73RAS3CGOPBWYT7EZVP6O/"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N2N3N3SNBHSH7GN3JOLR7YUF5FCTQQ5O/"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4HPRUIPAI2BBDGFVLN733JLIUJWLEBLF/"}],"providerMetadata":{"orgId":"206fc3a0-e175-490b-9eaa-a5738056c9f6","shortName":"NLnet Labs","dateUpdated":"2024-03-23T02:06:43.815Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-1622","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-02-27T16:04:33.625005Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-05T17:22:01.305Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T18:48:21.895Z"},"title":"CVE Program Container","references":[{"url":"https://www.nlnetlabs.nl/downloads/routinator/CVE-2024-1622.txt","tags":["vendor-advisory","x_transferred"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K52QRRYBHLP73RAS3CGOPBWYT7EZVP6O/","tags":["x_transferred"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N2N3N3SNBHSH7GN3JOLR7YUF5FCTQQ5O/","tags":["x_transferred"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4HPRUIPAI2BBDGFVLN733JLIUJWLEBLF/","tags":["x_transferred"]}]}]}}