First published: Mon May 29 2017(Updated: )
In lib/conntrack.c in the firewall implementation in Open vSwitch (OvS) 2.6.1, there is a buffer over-read while parsing malformed TCP, UDP, and IPv6 packets in the functions `extract_l3_ipv6`, `extract_l4_tcp`, and `extract_l4_udp` that can be triggered remotely.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Open vSwitch | =2.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9264 has been classified with a medium severity level due to the potential for remote exploitation through malformed packets.
CVE-2017-9264 affects Open vSwitch version 2.6.1.
To fix CVE-2017-9264, upgrade your Open vSwitch installation to a version that is not vulnerable.
CVE-2017-9264 is a buffer over-read vulnerability that occurs while parsing certain malformed network packets.
Yes, CVE-2017-9264 can be exploited remotely by sending malformed TCP, UDP, or IPv6 packets.