Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-25076

Опубликовано: 09 сент. 2022
Источник: redhat
CVSS3: 5.8
EPSS Низкий

Описание

The TSS (Tuple Space Search) algorithm in Open vSwitch 2.x through 2.17.2 and 3.0.0 allows remote attackers to cause a denial of service (delays of legitimate traffic) via crafted packet data that requires excessive evaluation time within the packet classification algorithm for the MegaFlow cache, aka a Tuple Space Explosion (TSE) attack.

A flaw was found in the Tuple Space Search (TSS) algorithm in Open vSwitch 2.x through 2.17.2 and 3.0.0. This issue allows remote attackers to cause a denial of service via crafted packet data that requires excessive evaluation time within the packet classification algorithm for the MegaFlow cache (Tuple Space Explosion (TSE) attack).

Отчет

Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. Red Hat restricts access to all platform information by default, granting access only after successful hard token-based multi-factor authentication (MFA) and enforcing least privilege to ensure only authorized roles can execute or modify code. The environment employs malicious code protections, including IDS/IPS and antimalware tools to detect threats and monitor resource usage, helping prevent uncontrolled consumption that could lead to system failure. Additional safeguards, such as web application firewalls and load-balancing strategies, protect against resource exhaustion and performance degradation. Event logs are centrally collected, correlated, and analyzed to support monitoring, alerting, and retention, aiding in the detection of abnormal behavior and potential denial-of-service (DoS) conditions. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of input-based DoS attacks.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Fast Datapath for RHEL 7openvswitchWill not fix
Fast Datapath for RHEL 7openvswitch2.10Out of support scope
Fast Datapath for RHEL 7openvswitch2.11Out of support scope
Fast Datapath for RHEL 7openvswitch2.12Out of support scope
Fast Datapath for RHEL 7openvswitch2.13Out of support scope
Fast Datapath for RHEL 8openvswitch2.11Out of support scope
Fast Datapath for RHEL 8openvswitch2.12Out of support scope
Fast Datapath for RHEL 8openvswitch2.13Affected
Fast Datapath for RHEL 8openvswitch2.15Affected
Fast Datapath for RHEL 8openvswitch2.16Out of support scope

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=2135242openvswitch: DoS via crafted packet

EPSS

Процентиль: 71%
0.00677
Низкий

5.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.8
ubuntu
больше 3 лет назад

The TSS (Tuple Space Search) algorithm in Open vSwitch 2.x through 2.17.2 and 3.0.0 allows remote attackers to cause a denial of service (delays of legitimate traffic) via crafted packet data that requires excessive evaluation time within the packet classification algorithm for the MegaFlow cache, aka a Tuple Space Explosion (TSE) attack.

CVSS3: 5.8
nvd
больше 3 лет назад

The TSS (Tuple Space Search) algorithm in Open vSwitch 2.x through 2.17.2 and 3.0.0 allows remote attackers to cause a denial of service (delays of legitimate traffic) via crafted packet data that requires excessive evaluation time within the packet classification algorithm for the MegaFlow cache, aka a Tuple Space Explosion (TSE) attack.

CVSS3: 5.8
msrc
больше 3 лет назад

The TSS (Tuple Space Search) algorithm in Open vSwitch 2.x through 2.17.2 and 3.0.0 allows remote attackers to cause a denial of service (delays of legitimate traffic) via crafted packet data that requires excessive evaluation time within the packet classification algorithm for the MegaFlow cache aka a Tuple Space Explosion (TSE) attack.

CVSS3: 5.8
debian
больше 3 лет назад

The TSS (Tuple Space Search) algorithm in Open vSwitch 2.x through 2.1 ...

CVSS3: 5.8
github
больше 3 лет назад

The TSS (Tuple Space Search) algorithm in Open vSwitch 2.x through 2.17.2 and 3.0.0 allows remote attackers to cause a denial of service (delays of legitimate traffic) via crafted packet data that requires excessive evaluation time within the packet classification algorithm for the MegaFlow cache, aka a Tuple Space Explosion (TSE) attack.

EPSS

Процентиль: 71%
0.00677
Низкий

5.8 Medium

CVSS3