Vulnerability CVE-2020-35498


Published: 2021-02-11

Description:
A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.

Type:

CWE-400

(Uncontrolled Resource Consumption ('Resource Exhaustion'))

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.8/10
6.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Complete
Affected software
Openvswitch -> Openvswitch 
Debian -> Debian linux 

 References:
https://bugzilla.redhat.com/show_bug.cgi?id=1908845
https://www.debian.org/security/2021/dsa-4852
https://www.openwall.com/lists/oss-security/2021/02/10/4

Copyright 2024, cxsecurity.com

 

Back to Top