CVE-2016-2074: MPLS buffer overflow vulnerabilities in Open vSwitch
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Mirantis OpenStack |
Fix Released
|
High
|
Albert Syriy | ||
7.0.x |
Won't Fix
|
Medium
|
MOS Maintenance | ||
8.0.x |
Won't Fix
|
Medium
|
MOS Maintenance | ||
9.x |
Fix Released
|
High
|
Albert Syriy |
Bug Description
Multiple versions of Open vSwitch are vulnerable to remote buffer
overflow attacks, in which crafted MPLS packets could overflow the
buffer reserved for MPLS labels in an OVS internal data structure.
The MPLS packets that trigger the vulnerability and the potential for
exploitation vary depending on version:
- Open vSwitch 2.1.x and earlier are not vulnerable.
- In Open vSwitch 2.2.x and 2.3.x, the MPLS buffer overflow can be
exploited for arbitrary remote code execution.
- In Open vSwitch 2.4.x, the MPLS buffer overflow does not
obviously lead to a remote code execution exploit, but testing
shows that it can allow a remote denial of service. See the
mitigation section for details.
- Open vSwitch 2.5.x is not vulnerable.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the identifier CVE-2016-2074 to this issue.
CVE References
description: | updated |
Changed in mos: | |
assignee: | nobody → MOS Linux (mos-linux) |
information type: | Private Security → Public Security |
tags: | added: area-linux |
Changed in mos: | |
status: | New → Confirmed |
importance: | Undecided → High |
milestone: | none → 9.0 |
tags: | removed: need-info |
(This check performed automatically)
Please, make sure that bug description contains the following sections filled in with the appropriate data related to the bug you are describing:
actual result
expected result
steps to reproduce
For more detailed information on the contents of each of the listed sections see https:/ /wiki.openstack .org/wiki/ Fuel/How_ to_contribute# Here_is_ how_you_ file_a_ bug