First published: Mon May 29 2017(Updated: )
In Open vSwitch (OvS) v2.7.0, there is a buffer over-read while parsing the group mod OpenFlow message sent from the controller in `lib/ofp-util.c` in the function `ofputil_pull_ofp15_group_mod`.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Open vSwitch | =2.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9265 has been classified as a medium severity vulnerability due to the potential for buffer over-reads.
To mitigate CVE-2017-9265, upgrade Open vSwitch to version 2.7.1 or later where the vulnerability has been addressed.
CVE-2017-9265 specifically affects Open vSwitch version 2.7.0.
CVE-2017-9265 is a buffer over-read vulnerability occurring in the parsing of OpenFlow messages within Open vSwitch.
CVE-2017-9265 may potentially be exploited remotely depending on the configuration and access controls of the Open vSwitch installation.