First published: Thu Jul 18 2019(Updated: )
The Linux Foundation ONOS 2.0.0 and earlier is affected by: Integer Overflow. The impact is: A network administrator (or attacker) can install unintended flow rules in the switch by mistake. The component is: createFlow() and createFlows() functions in FlowWebResource.java (RESTful service). The attack vector is: network management and connectivity.
Credit: josh@bress.net
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Foundation Open Network Operating System | <=2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1010249 has a medium severity rating due to the potential for unintended changes to flow rules.
To address CVE-2019-1010249, upgrade to a version of ONOS later than 2.0.0 that includes the necessary patches.
CVE-2019-1010249 affects ONOS 2.0.0 and earlier versions of the Linux Foundation Open Network Operating System.
Exploiting CVE-2019-1010249 can allow an attacker to unintentionally install incorrect flow rules in network switches.
The vulnerability in CVE-2019-1010249 is tied to the createFlow() and createFlows() functions in FlowWebResource.java.