#VU74579 Input validation error in Open vSwitch - CVE-2023-1668
Published: April 6, 2023
Open vSwitch
openvswitch.org
Description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when processing IP packets. A remote attacker can send specially crafted IP packets with "ip proto" set to "0" and perform a denial of service (DoS) attack.
Successful exploitation of the vulnerability requires that flow rules contain 'set' actions on other fields in the IP protocol header.