Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-55553

EPSS 0.18% · P40
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-55553

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
In FRRouting (FRR) before 10.3 from 6.0 onward, all routes are re-validated if the total size of an update received via RTR exceeds the internal socket's buffer size, default 4K on most OSes. An attacker can use this to trigger re-parsing of the RIB for FRR routers using RTR by causing more than this number of updates during an update interval (usually 30 minutes). Additionally, this effect regularly occurs organically. Furthermore, an attacker can use this to trigger route validation continuously. Given that routers with large full tables may need more than 30 minutes to fully re-validate the table, continuous issuance/withdrawal of large numbers of ROA may be used to impact the route handling performance of all FRR instances using RPKI globally. Additionally, the re-validation will cause heightened BMP traffic to ingestors. Fixed Versions: 10.0.3, 10.1.2, 10.2.1, >= 10.3.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
FRRouting 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
FRRouting是FRRouting开源的一种在类 Unix 平台上运行的网络路由软件套件。 FRRouting 10.3之前版本存在安全漏洞,该漏洞源于攻击者可以通过发送大约500个RPKI更新来触发重复的RIB重新验证,从而导致重新验证时间延长和拒绝服务。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2024-55553

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-55553

登录查看更多情报信息。

Same Patch Batch · n/a · 2025-01-06 · 25 CVEs total

CVE-2024-54767AVM FRITZ!Box 7530 AX 安全漏洞
CVE-2021-27285Inspur ClusterEngine 安全漏洞
CVE-2024-53935Galaxy studio apps iCall OS17 Color Phone Flash 安全漏洞
CVE-2024-53932BG.Studio Color Phone Call Screen App 安全漏洞
CVE-2024-53934BG.Studio Color Phone Call Screen App 安全漏洞
CVE-2024-53931Wallfinity: Lovely Caller Theme iCaller Caller Theme & Dialer 安全漏洞
CVE-2024-53933HK DEVERLOP: Personalize Your World Call Theme & Call Screen 安全漏洞
CVE-2024-53936BG.Studio Color Phone Call Screen App 安全漏洞
CVE-2024-46622SecureAge Security Suite 安全漏洞
CVE-2024-46209Yakamara Media Redaxo CMS 安全漏洞
CVE-2024-46073Glacies IceHRM 安全漏洞
CVE-2024-54764ipTIME A2004 安全漏洞
CVE-2024-35498Grav 安全漏洞
CVE-2024-54880SeaCMS 安全漏洞
CVE-2024-54879SeaCMS 安全漏洞
CVE-2024-54763ipTIME A2004 安全漏洞
CVE-2024-51112PNETLab 安全漏洞
CVE-2024-51111PNETLab 安全漏洞
CVE-2024-56828ChestnutCMS 安全漏洞
CVE-2024-55407ITE IO Access 安全漏洞

Showing top 20 of 25 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2024-55553

No comments yet


Leave a comment