Severity
9.8CRITICAL
EPSS
1.4%
top 19.43%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 29
Latest updateMay 13

Description

In Open vSwitch (OvS) v2.7.0, there is a buffer over-read while parsing the group mod OpenFlow message sent from the controller in `lib/ofp-util.c` in the function `ofputil_pull_ofp15_group_mod`.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

Debianopenvswitch< 2.8.1+dfsg1-2+3

Patches

🔴Vulnerability Details

3
GHSA
GHSA-34xg-fgjc-449p: In Open vSwitch (OvS) v22022-05-13
OSV
CVE-2017-9265: In Open vSwitch (OvS) v22017-05-29
CVEList
CVE-2017-9265: In Open vSwitch (OvS) v22017-05-29

📋Vendor Advisories

3
Ubuntu
Open vSwitch vulnerabilities2017-10-11
Red Hat
openvswitch: Buffer over-read while parsing the group mod OpenFlow message2017-05-26
Debian
CVE-2017-9265: openvswitch - In Open vSwitch (OvS) v2.7.0, there is a buffer over-read while parsing the grou...2017

💬Community

2
Bugzilla
CVE-2017-9265 openvswitch: Buffer over-read while parsing the group mod OpenFlow message2017-05-31
Bugzilla
CVE-2016-10377 CVE-2017-9214 CVE-2017-9263 CVE-2017-9264 CVE-2017-9265 openvswitch: various flaws [fedora-all]2017-05-30