CVE-2017-9214

Severity
9.8CRITICAL
EPSS
3.4%
top 12.60%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 23
Latest updateMay 13

Description

In Open vSwitch (OvS) 2.7.0, while parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message, there is a buffer over-read that is caused by an unsigned integer underflow in the function `ofputil_pull_queue_get_config_reply10` in `lib/ofp-util.c`.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages6 packages

Debianopenvswitch< 2.8.1+dfsg1-2+3
Ubuntuopenvswitch< 2.5.2-0ubuntu0.16.04.2
NVDredhat/openstack6 versions+5
NVDredhat/virtualization4.0, 4.1+1

Also affects: Debian Linux 9.0

Patches

🔴Vulnerability Details

4
GHSA
GHSA-6q3f-fc2p-9rh3: In Open vSwitch (OvS) 22022-05-13
OSV
openvswitch vulnerabilities2017-10-11
CVEList
CVE-2017-9214: In Open vSwitch (OvS) 22017-05-23
OSV
CVE-2017-9214: In Open vSwitch (OvS) 22017-05-23

📋Vendor Advisories

3
Ubuntu
Open vSwitch vulnerabilities2017-10-11
Red Hat
openvswitch: Integer underflow in the ofputil_pull_queue_get_config_reply10 function2017-05-20
Debian
CVE-2017-9214: openvswitch - In Open vSwitch (OvS) 2.7.0, while parsing an OFPT_QUEUE_GET_CONFIG_REPLY type O...2017

💬Community

2
Bugzilla
CVE-2017-9214 openvswitch: Integer underflow in the ofputil_pull_queue_get_config_reply10 function2017-05-30
Bugzilla
CVE-2016-10377 CVE-2017-9214 CVE-2017-9263 CVE-2017-9264 CVE-2017-9265 openvswitch: various flaws [fedora-all]2017-05-30
CVE-2017-9214 (CRITICAL CVSS 9.8) | In Open vSwitch (OvS) 2.7.0 | cvebase.io