Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4066-1 | fort-validator security update |
Ubuntu USN |
USN-7813-1 | FORT Validator vulnerabilities |
Mon, 03 Nov 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 27 Aug 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nicmx
Nicmx fort-validator |
|
| CPEs | cpe:2.3:a:nicmx:fort-validator:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Nicmx
Nicmx fort-validator |
Mon, 26 Aug 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fort Validator Project
Fort Validator Project fort Validator |
|
| Weaknesses | CWE-120 | |
| CPEs | cpe:2.3:a:fort_validator_project:fort_validator:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Fort Validator Project
Fort Validator Project fort Validator |
|
| Metrics |
cvssV3_1
|
Sat, 24 Aug 2024 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) a resource certificate containing a Key Usage extension composed of more than two bytes of data. Fort writes this string into a 2-byte buffer without properly sanitizing its length, leading to a buffer overflow. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-03T20:39:06.541Z
Reserved: 2024-08-24T00:00:00.000Z
Link: CVE-2024-45237
Updated: 2025-11-03T20:39:06.541Z
Status : Modified
Published: 2024-08-24T23:15:04.243
Modified: 2025-11-03T21:16:20.580
Link: CVE-2024-45237
No data.
OpenCVE Enrichment
No data.
Debian DLA
Ubuntu USN