First published: Mon May 29 2017(Updated: )
In Open vSwitch (OvS) 2.7.0, while parsing an OpenFlow role status message, there is a call to the abort() function for undefined role status reasons in the function `ofp_print_role_status_message` in `lib/ofp-print.c` that may be leveraged toward a remote DoS attack by a malicious switch.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Open vSwitch | =2.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9263 is classified as a potential remote denial of service (DoS) vulnerability.
To mitigate CVE-2017-9263, upgrade Open vSwitch to a version later than 2.7.0 that addresses this vulnerability.
Open vSwitch version 2.7.0 is specifically affected by CVE-2017-9263.
CVE-2017-9263 can be exploited to perform a remote denial of service attack.
The `ofp_print_role_status_message` function in `lib/ofp-print.c` is impacted by CVE-2017-9263.