First published: Wed May 31 2017(Updated: )
In Open vSwitch while parsing an OpenFlow role status message, there is a call to the abort() function for undefined role status reasons in the function `ofp_print_role_status_message` in `lib/ofp-print.c` that may be leveraged toward a remote DoS attack by a malicious switch. References: <a href="https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332966.html">https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332966.html</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Open vSwitch |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1457327 is classified as a potential remote denial of service (DoS) vulnerability.
To fix REDHAT-BUG-1457327, you should update to the latest version of Open vSwitch that addresses this vulnerability.
The potential impacts of REDHAT-BUG-1457327 include disruption of service due to a remote DoS attack.
Users and systems running vulnerable versions of Open vSwitch are affected by REDHAT-BUG-1457327.
The nature of the vulnerability in REDHAT-BUG-1457327 involves the abort() function being called due to undefined role status reasons, which can lead to a DoS condition.