Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-35498

Опубликовано: 11 фев. 2021
Источник: nvd
CVSS3: 7.5
CVSS2: 7.8
EPSS Низкий

Описание

A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:*
Версия от 2.5.0 (включая) до 2.5.12 (исключая)
cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:*
Версия от 2.6.0 (включая) до 2.6.10 (исключая)
cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:*
Версия от 2.7.0 (включая) до 2.7.13 (исключая)
cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:*
Версия от 2.8.0 (включая) до 2.8.11 (исключая)
cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:*
Версия от 2.9.0 (включая) до 2.9.9 (исключая)
cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:*
Версия от 2.10.0 (включая) до 2.10.7 (исключая)
cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:*
Версия от 2.11.0 (включая) до 2.11.6 (исключая)
cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:*
Версия от 2.12.0 (включая) до 2.12.3 (исключая)
cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:*
Версия от 2.13.0 (включая) до 2.13.3 (исключая)
cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:*
Версия от 2.14.0 (включая) до 2.14.2 (исключая)
Конфигурация 2

Одно из

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Конфигурация 3
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*

EPSS

Процентиль: 90%
0.05765
Низкий

7.5 High

CVSS3

7.8 High

CVSS2

Дефекты

CWE-400

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 5 лет назад

A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.

CVSS3: 7.5
redhat
почти 5 лет назад

A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.

CVSS3: 7.5
msrc
почти 5 лет назад

A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide potentially causing a denial of service. The highest threat from this vulnerability is to system availability.

CVSS3: 7.5
debian
почти 5 лет назад

A vulnerability was found in openvswitch. A limitation in the implemen ...

suse-cvrf
почти 5 лет назад

Security update for openvswitch

EPSS

Процентиль: 90%
0.05765
Низкий

7.5 High

CVSS3

7.8 High

CVSS2

Дефекты

CWE-400