Vulnerability CVE-2017-9214


Published: 2017-05-23

Description:
In Open vSwitch (OvS) 2.7.0, while parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message, there is a buffer over-read that is caused by an unsigned integer underflow in the function `ofputil_pull_queue_get_config_reply10` in `lib/ofp-util.c`.

Type:

CWE-191

(Integer Underflow (Wrap or Wraparound))

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Openvswitch -> Openvswitch 

 References:
https://access.redhat.com/errata/RHSA-2017:2418
https://access.redhat.com/errata/RHSA-2017:2553
https://access.redhat.com/errata/RHSA-2017:2648
https://access.redhat.com/errata/RHSA-2017:2665
https://access.redhat.com/errata/RHSA-2017:2692
https://access.redhat.com/errata/RHSA-2017:2698
https://access.redhat.com/errata/RHSA-2017:2727
https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332711.html

Copyright 2024, cxsecurity.com

 

Back to Top