First published: Thu Mar 17 2016(Updated: )
Buffer overflow in lib/flow.c in ovs-vswitchd in Open vSwitch 2.2.x and 2.3.x before 2.3.3 and 2.4.x before 2.4.1 allows remote attackers to execute arbitrary code via crafted MPLS packets, as demonstrated by a long string in an ovs-appctl command.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/openvswitch | <2.5.0 | 2.5.0 |
debian/openvswitch | 2.15.0+ds1-2+deb11u5 3.1.0-2+deb12u1 3.3.1-1 | |
Open vSwitch | =2.2.0 | |
Open vSwitch | =2.3.0 | |
Open vSwitch | =2.3.1 | |
Open vSwitch | =2.3.2 | |
Open vSwitch | =2.4.0 | |
Red Hat OpenShift | =3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2074 is classified as a high severity vulnerability due to its potential to allow remote code execution on affected systems.
Open vSwitch versions 2.2.x, 2.3.x before 2.3.3, and 2.4.x before 2.4.1 are affected by CVE-2016-2074.
To fix CVE-2016-2074, upgrade Open vSwitch to version 2.5.0 or later for Red Hat or to the latest versions provided by Debian.
CVE-2016-2074 is caused by a buffer overflow in the handling of crafted MPLS packets in Open vSwitch.
There are no known effective workarounds for CVE-2016-2074; upgrading to a patched version is recommended.