Buffer overflow in Open vSwitch - CVE-2016-10377

 

Buffer overflow in Open vSwitch - CVE-2016-10377

Published: May 29, 2017 / Updated: August 8, 2020


Vulnerability identifier: #VU38937
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2016-10377
CWE-ID: CWE-119
Exploitation vector: Adjecent network
Exploit availability: No public exploit available
Vendor: openvswitch.org
Affected software:
Open vSwitch

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

In Open vSwitch (OvS) 2.5.0, a malformed IP packet can cause the switch to read past the end of the packet buffer due to an unsigned integer underflow in `lib/flow.c` in the function `miniflow_extract`, permitting remote bypass of the access control list enforced by the switch.


How to mitigate CVE-2016-10377

Install update from vendor's website.

Sources