[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3533-1 openvswitch -- openvswitch

ID: oval:org.secpod.oval:def:602445Date: (C)2016-03-30   (M)2021-06-02
Class: PATCHFamily: unix




Kashyap Thimmaraju and Bhargava Shastry discovered a remotely triggerable buffer overflow vulnerability in openvswitch, a production quality, multilayer virtual switch implementation. Specially crafted MPLS packets could overflow the buffer reserved for MPLS labels in an OVS internal data structure. A remote attacker can take advantage of this flaw to cause a denial of service, or potentially, execution of arbitrary code.

Platform:
Debian 8.x
Product:
openvswitch-switch
Reference:
DSA-3533-1
CVE-2016-2074
CVE    1
CVE-2016-2074
CPE    2
cpe:/o:debian:debian_linux:8.x
cpe:/a:openvswitch:openvswitch-switch

© SecPod Technologies