CVE-2024-10455

7.5 HIGH

📋 TL;DR

A reachable assertion vulnerability in the BPv7 parser of µD3TN v0.14.0 allows attackers to cause denial of service by sending malformed Extension Blocks. This affects systems running µD3TN for Delay-Tolerant Networking communications, potentially disrupting data transmission services.

💻 Affected Systems

Products:
  • µD3TN (micro Delay-Tolerant Networking)
Versions: v0.14.0
Operating Systems: Linux, Unix-like systems
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with µD3TN configured to process BPv7 bundles with Extension Blocks

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption causing µD3TN process termination and loss of DTN communications

🟠

Likely Case

Service interruption requiring manual restart of µD3TN processes

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring

🌐 Internet-Facing: MEDIUM - Requires network access to µD3TN service but exploit is simple
🏢 Internal Only: MEDIUM - Internal attackers could disrupt critical DTN communications

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple malformed packet construction can trigger the assertion

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v0.15.0 or later

Vendor Advisory: https://gitlab.com/d3tn/ud3tn/-/issues/227

Restart Required: Yes

Instructions:

1. Download latest µD3TN release from GitLab. 2. Stop µD3TN service. 3. Install new version. 4. Restart µD3TN service.

🔧 Temporary Workarounds

Network Filtering

linux

Block malformed Extension Blocks at network perimeter

iptables -A INPUT -p tcp --dport <ud3tn-port> -m string --string "malformed-pattern" --algo bm -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate µD3TN from untrusted networks
  • Deploy intrusion detection systems to monitor for malformed BPv7 traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check µD3TN version: if running v0.14.0, system is vulnerable

Check Version:

ud3tn --version

Verify Fix Applied:

Verify µD3TN version is v0.15.0 or later and service runs without assertion errors

📡 Detection & Monitoring

Log Indicators:

  • Assertion failure logs in µD3TN output
  • Process termination/crash logs

Network Indicators:

  • Unusual BPv7 Extension Block patterns
  • Repeated connection attempts to µD3TN port

SIEM Query:

source="ud3tn.log" AND ("assertion" OR "terminated unexpectedly")

🔗 References

📤 Share & Export