9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
ovs is vulnerable to buffer over-reads. The library does not check if the message length was in the specified range before reading it in the ofputil_pull_ofp15_group_mod()
function in lib/ofp-util.c
. This can allow a malicious user to cause a buffer over-read which can cause the application to crash or overwrite parts of the memory.
access.redhat.com/errata/RHSA-2017:2418
access.redhat.com/errata/RHSA-2017:2553
access.redhat.com/errata/RHSA-2017:2648
access.redhat.com/errata/RHSA-2017:2665
access.redhat.com/errata/RHSA-2017:2692
access.redhat.com/errata/RHSA-2017:2698
access.redhat.com/errata/RHSA-2017:2727
mail.openvswitch.org/pipermail/ovs-dev/2017-May/332965.html
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P