Executive Summary

Summary
Title Open vSwitch: Remote execution of arbitrary code
Informations
Name GLSA-201701-07 First vendor Publication 2017-01-01
Vendor Gentoo Last vendor Modification 2017-01-01
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Synopsis

A buffer overflow in Open vSwitch might allow remote attackers to execute arbitrary code.

Background

Open vSwitch is a production quality multilayer virtual switch.

Description

A buffer overflow was discovered in lib/flow.c in ovs-vswitchd.

Impact

A remote attacker, using a specially crafted MPLS packet, could execute arbitrary code.

Workaround

There is no known workaround at this time.

Resolution

All Open vSwitch users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/openvswitch-2.5.0"

References

[ 1 ] CVE-2016-2074 : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2074

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

https://security.gentoo.org/glsa/201701-07

Original Source

Url : http://security.gentoo.org/glsa/glsa-201701-07.xml

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 5
Application 1

Nessus® Vulnerability Scanner

Date Description
2018-04-06 Name : A server virtualization platform installed on the remote host is affected by ...
File : citrix_xenserver_CTX232655.nasl - Type : ACT_GATHER_INFO
2017-01-03 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201701-07.nasl - Type : ACT_GATHER_INFO
2016-05-31 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_b53bbf58257f11e69f4d20cf30e32f6d.nasl - Type : ACT_GATHER_INFO
2016-03-29 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3533.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2017-01-04 13:23:10
  • Multiple Updates
2017-01-01 17:20:35
  • First insertion