First published: Wed May 31 2017(Updated: )
In lib/conntrack.c in the firewall implementation in Open vSwitch, there is a buffer over-read while parsing malformed TCP, UDP, and IPv6 packets in the functions `extract_l3_ipv6`, `extract_l4_tcp`, and `extract_l4_udp` that can be triggered remotely. References: <a href="https://mail.openvswitch.org/pipermail/ovs-dev/2017-March/329323.html">https://mail.openvswitch.org/pipermail/ovs-dev/2017-March/329323.html</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Open vSwitch |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1457329 is classified as important due to the potential for remote exploitation.
To fix REDHAT-BUG-1457329, you should update Open vSwitch to the latest version that contains the security patch.
REDHAT-BUG-1457329 affects systems running Open vSwitch, particularly in configurations utilizing TCP, UDP, and IPv6.
Yes, REDHAT-BUG-1457329 can be exploited remotely by sending malformed TCP, UDP, or IPv6 packets.
REDHAT-BUG-1457329 is a buffer over-read vulnerability in the Open vSwitch firewall implementation.