The NASA’s Interplanetary Overlay Network (ION) is an implementation of Delay/Disruption Tolerant Networking (DTN). A segmentation fault occurs with ION-DTN BPv7 software version 4.1.3 when a bundle with a Destination Endpoint ID (EID) set to dtn:none is received. This causes the node to become unresponsive to incoming bundles, leading to a Denial of Service (DoS) condition. This vulnerability is fixed in 4.1.3s.
History

Thu, 05 Dec 2024 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Nasajpl
Nasajpl iondtn
CPEs cpe:2.3:a:nasa_interplanetary_overlay_network:delay_disruption_tolerant_networking:*:*:*:*:*:*:*:* cpe:2.3:a:nasajpl:iondtn:*:*:*:*:*:*:*:*
Vendors & Products Nasa Interplanetary Overlay Network
Nasa Interplanetary Overlay Network delay Disruption Tolerant Networking
Nasajpl
Nasajpl iondtn

Thu, 05 Dec 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Nasa Interplanetary Overlay Network
Nasa Interplanetary Overlay Network delay Disruption Tolerant Networking
CPEs cpe:2.3:a:nasa_interplanetary_overlay_network:delay_disruption_tolerant_networking:*:*:*:*:*:*:*:*
Vendors & Products Nasa Interplanetary Overlay Network
Nasa Interplanetary Overlay Network delay Disruption Tolerant Networking
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 05 Dec 2024 15:30:00 +0000

Type Values Removed Values Added
Description The NASA’s Interplanetary Overlay Network (ION) is an implementation of Delay/Disruption Tolerant Networking (DTN). A segmentation fault occurs with ION-DTN BPv7 software version 4.1.3 when a bundle with a Destination Endpoint ID (EID) set to dtn:none is received. This causes the node to become unresponsive to incoming bundles, leading to a Denial of Service (DoS) condition. This vulnerability is fixed in 4.1.3s.
Title Segmentation Fault in `forwardBundle` Function of ION-DTN BPv7 When Destination EID is `dtn:none` (public)
Weaknesses CWE-476
References
Metrics cvssV4_0

{'score': 9.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-12-05T15:10:37.229Z

Updated: 2024-12-05T17:24:37.371Z

Reserved: 2024-11-29T18:02:16.754Z

Link: CVE-2024-54130

cve-icon Vulnrichment

Updated: 2024-12-05T16:45:46.540Z

cve-icon NVD

Status : Received

Published: 2024-12-05T16:15:27.020

Modified: 2024-12-05T16:15:27.020

Link: CVE-2024-54130

cve-icon Redhat

No data.