Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-9264

Опубликовано: 03 мар. 2017
Источник: redhat
CVSS3: 5.6
EPSS Низкий

Описание

In lib/conntrack.c in the firewall implementation in Open vSwitch (OvS) 2.6.1, there is a buffer over-read while parsing malformed TCP, UDP, and IPv6 packets in the functions extract_l3_ipv6, extract_l4_tcp, and extract_l4_udp that can be triggered remotely.

A buffer over-read was found in the Open vSwitch (OvS) firewall implementation. This flaw can be triggered by parsing a specially crafted TCP, UDP, or IPv6 packet. A remote attack could use this flaw to cause a Denial of Service (DoS).

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux OpenStack Platform 5 (Icehouse)openvswitchNot affected
Red Hat Enterprise Linux OpenStack Platform 6 (Juno)openvswitchNot affected
Red Hat Enterprise Linux OpenStack Platform 7 (Kilo)openvswitchNot affected
Red Hat OpenShift Enterprise 3openvswitchNot affected
Red Hat OpenStack Platform 12 (Pike)openvswitchNot affected
Red Hat OpenStack Platform 8 (Liberty)openvswitchNot affected
Red Hat OpenStack Platform 9 (Mitaka)openvswitchNot affected
Fast Datapath for Red Hat Enterprise Linux 7openvswitchFixedRHSA-2017:241803.08.2017
Red Hat OpenStack Platform 10.0 (Newton)openvswitchFixedRHSA-2017:264806.09.2017
Red Hat OpenStack Platform 11.0 (Ocata)openvswitchFixedRHSA-2017:272713.09.2017

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=1457329openvswitch: Buffer over-read while parsing malformed TCP, UDP and IPv6 packets

EPSS

Процентиль: 73%
0.00786
Низкий

5.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 8 лет назад

In lib/conntrack.c in the firewall implementation in Open vSwitch (OvS) 2.6.1, there is a buffer over-read while parsing malformed TCP, UDP, and IPv6 packets in the functions `extract_l3_ipv6`, `extract_l4_tcp`, and `extract_l4_udp` that can be triggered remotely.

CVSS3: 9.8
nvd
больше 8 лет назад

In lib/conntrack.c in the firewall implementation in Open vSwitch (OvS) 2.6.1, there is a buffer over-read while parsing malformed TCP, UDP, and IPv6 packets in the functions `extract_l3_ipv6`, `extract_l4_tcp`, and `extract_l4_udp` that can be triggered remotely.

CVSS3: 9.8
debian
больше 8 лет назад

In lib/conntrack.c in the firewall implementation in Open vSwitch (OvS ...

CVSS3: 9.8
github
больше 3 лет назад

In lib/conntrack.c in the firewall implementation in Open vSwitch (OvS) 2.6.1, there is a buffer over-read while parsing malformed TCP, UDP, and IPv6 packets in the functions `extract_l3_ipv6`, `extract_l4_tcp`, and `extract_l4_udp` that can be triggered remotely.

EPSS

Процентиль: 73%
0.00786
Низкий

5.6 Medium

CVSS3