First published: Thu Sep 08 2022(Updated: )
The TSS (Tuple Space Search) algorithm in Open vSwitch 2.x through 2.17.2 and 3.0.0 allows remote attackers to cause a denial of service (delays of legitimate traffic) via crafted packet data that requires excessive evaluation time within the packet classification algorithm for the MegaFlow cache, aka a Tuple Space Explosion (TSE) attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Open vSwitch | >=2.0.0<=2.17.2 | |
Open vSwitch | =3.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-25076 is a vulnerability in the TSS (Tuple Space Search) algorithm in Open vSwitch that allows remote attackers to cause a denial of service.
CVE-2019-25076 can cause delays of legitimate traffic in Open vSwitch due to crafted packet data that requires excessive evaluation time in the packet classification algorithm for the MegaFlow cache.
Open vSwitch versions 2.x through 2.17.2 and 3.0.0 are affected by CVE-2019-25076.
CVE-2019-25076 has a severity score of 5.8, which is considered medium.
To fix CVE-2019-25076, users should update to a version of Open vSwitch that is not affected by the vulnerability.