CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
78.3%
A flaw was found in multiple versions of OpenvSwitch. Specially crafted LLDP packets can cause memory to be lost when allocating data to handle specific optional TLVs, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.
Vendor | Product | Version | CPE |
---|---|---|---|
openvswitch | openvswitch | * | cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:* |
openvswitch | openvswitch | * | cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:* |
openvswitch | openvswitch | * | cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:* |
openvswitch | openvswitch | * | cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:* |
openvswitch | openvswitch | * | cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:* |
openvswitch | openvswitch | * | cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:* |
openvswitch | openvswitch | * | cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:* |
openvswitch | openvswitch | * | cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:* |
openvswitch | openvswitch | * | cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:* |
openvswitch | openvswitch | * | cpe:2.3:a:openvswitch:openvswitch:*:*:*:*:*:*:*:* |
[
{
"vendor": "n/a",
"product": "lldp/openvswitch",
"versions": [
{
"version": "lldpd 1.0.8, openvswitch 2.14.1, openvswitch 2.13.2, openvswitch 2.12.2, openvswitch 2.11.5, openvswitch 2.10.6, openvswitch 2.9.8, openvswitch 2.8.10, openvswitch 2.7.12, openvswitch 2.6.9",
"status": "affected"
}
]
}
]
bugzilla.redhat.com/show_bug.cgi?id=1921438
cert-portal.siemens.com/productcert/pdf/ssa-941426.pdf
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3T5XHPOGIPWCRRPJUE6P3HVC5PTSD5JS/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JYA4AMJXCNF6UPFG36L2TPPT32C242SP/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SKQWHG2SZJZSGC7PXVDAEJYBN7ESDR7D/
mail.openvswitch.org/pipermail/ovs-dev/2021-January/379471.html
security.gentoo.org/glsa/202311-16
us-cert.cisa.gov/ics/advisories/icsa-21-194-07
More
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
78.3%