[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253741

 
 

909

 
 

197391

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2023-1668Date: (C)2023-04-12   (M)2023-12-04


A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 8.2CVSS Score :
Exploit Score: 3.9Exploit Score:
Impact Score: 4.2Impact Score:
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector:
Attack Complexity: LOWAccess Complexity:
Privileges Required: NONEAuthentication:
User Interaction: NONEConfidentiality:
Scope: UNCHANGEDIntegrity:
Confidentiality: LOWAvailability:
Integrity: NONE 
Availability: HIGH 
  
Reference:
DSA-5387
FEDORA-2023-7da03dc2ae
GLSA-202311-16
https://lists.debian.org/debian-lts-announce/2023/05/msg00000.html
https://bugzilla.redhat.com/show_bug.cgi?id=2137666
https://www.openwall.com/lists/oss-security/2023/04/06/1

CWE    1
CWE-670
OVAL    10
oval:org.secpod.oval:def:93191
oval:org.secpod.oval:def:125504
oval:org.secpod.oval:def:89048988
oval:org.secpod.oval:def:89048899
...

© SecPod Technologies