Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-1000361

Опубликовано: 21 апр. 2017
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

DOMRpcImplementationNotAvailableException when sending Port-Status packets to OpenDaylight. Controller launches exceptions and consumes more CPU resources. Component: OpenDaylight is vulnerable to this flaw. Version: The tested versions are OpenDaylight 3.3 and 4.0.

Отчет

This issue affects OpenDaylight in Red Hat OpenStack Platform 12.0 (Pike). However, OpenDaylight is only supported in segregated management networks; by default, at worst, this flaw would only be exposed on an admin network. For this reason, Red Hat Product Security has rated this issue as having security impact of Low. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenStack Platform 10 (Newton)opendaylightWill not fix
Red Hat OpenStack Platform 11 (Ocata)opendaylightWill not fix
Red Hat OpenStack Platform 12 (Pike)opendaylightWill not fix
Red Hat OpenStack Platform 8 (Liberty)opendaylightWill not fix
Red Hat OpenStack Platform 9 (Mitaka)opendaylightWill not fix

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-138
https://bugzilla.redhat.com/show_bug.cgi?id=1447856opendaylight: Port-Status packets sent to Controller create exceptions

EPSS

Процентиль: 65%
0.00494
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
почти 9 лет назад

DOMRpcImplementationNotAvailableException when sending Port-Status packets to OpenDaylight. Controller launches exceptions and consumes more CPU resources. Component: OpenDaylight is vulnerable to this flaw. Version: The tested versions are OpenDaylight 3.3 and 4.0.

CVSS3: 7.5
github
больше 3 лет назад

OpenDaylight Controller DoS

EPSS

Процентиль: 65%
0.00494
Низкий

5.3 Medium

CVSS3