Severity
9.8CRITICAL
EPSS
0.8%
top 26.19%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 29
Latest updateMay 13

Description

In lib/conntrack.c in the firewall implementation in Open vSwitch (OvS) 2.6.1, there is a buffer over-read while parsing malformed TCP, UDP, and IPv6 packets in the functions `extract_l3_ipv6`, `extract_l4_tcp`, and `extract_l4_udp` that can be triggered remotely.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

Debianopenvswitch< 2.8.1+dfsg1-2+3

Patches

🔴Vulnerability Details

4
GHSA
GHSA-r4pw-w7qg-248f: In lib/conntrack2022-05-13
OSV
openvswitch vulnerabilities2017-10-11
CVEList
CVE-2017-9264: In lib/conntrack2017-05-29
OSV
CVE-2017-9264: In lib/conntrack2017-05-29

📋Vendor Advisories

3
Ubuntu
Open vSwitch vulnerabilities2017-10-11
Red Hat
openvswitch: Buffer over-read while parsing malformed TCP, UDP and IPv6 packets2017-03-03
Debian
CVE-2017-9264: openvswitch - In lib/conntrack.c in the firewall implementation in Open vSwitch (OvS) 2.6.1, t...2017

💬Community

3
Bugzilla
CVE-2017-16898 ming: Buffer overflow in the printMP3Headers function2017-11-21
Bugzilla
CVE-2017-9264 openvswitch: Buffer over-read while parsing malformed TCP, UDP and IPv6 packets2017-05-31
Bugzilla
CVE-2016-10377 CVE-2017-9214 CVE-2017-9263 CVE-2017-9264 CVE-2017-9265 openvswitch: various flaws [fedora-all]2017-05-30