ID

VAR-201705-1387


CVE

CVE-2016-10377


TITLE

Open vSwitch Buffer error vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2016-008614

DESCRIPTION

In Open vSwitch (OvS) 2.5.0, a malformed IP packet can cause the switch to read past the end of the packet buffer due to an unsigned integer underflow in `lib/flow.c` in the function `miniflow_extract`, permitting remote bypass of the access control list enforced by the switch. Open vSwitch (OvS) Contains a buffer error vulnerability.Information is acquired, information is acquired, information is altered, and service operation is interrupted (DoS) There is a possibility of being put into a state. Open vSwitch (OvS) is a multi-layer virtual switch product based on open source technology (according to the Apache2.0 license). It supports large-scale network automation, standard management interfaces and protocols, etc. through programming extensions. There is a security vulnerability in the 'miniflow_extract' function of lib/flow.c file in OvS 2.5.0 version. A remote attacker could exploit this vulnerability to bypass access control lists

Trust: 1.71

sources: NVD: CVE-2016-10377 // JVNDB: JVNDB-2016-008614 // VULHUB: VHN-89147

AFFECTED PRODUCTS

vendor:openvswitchmodel:openvswitchscope:eqversion:2.5.0

Trust: 1.6

vendor:open vswitchmodel:open vswitchscope:eqversion:2.5.0

Trust: 0.8

sources: JVNDB: JVNDB-2016-008614 // CNNVD: CNNVD-201705-1376 // NVD: CVE-2016-10377

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-10377
value: HIGH

Trust: 1.0

NVD: CVE-2016-10377
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201705-1376
value: MEDIUM

Trust: 0.6

VULHUB: VHN-89147
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-10377
severity: MEDIUM
baseScore: 5.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-89147
severity: MEDIUM
baseScore: 5.8
vectorString: AV:A/AC:L/AU:N/C:P/I:P/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-10377
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-89147 // JVNDB: JVNDB-2016-008614 // CNNVD: CNNVD-201705-1376 // NVD: CVE-2016-10377

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-89147 // JVNDB: JVNDB-2016-008614 // NVD: CVE-2016-10377

THREAT TYPE

specific network environment

Trust: 0.6

sources: CNNVD: CNNVD-201705-1376

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201705-1376

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-008614

PATCH

title:[ovs-dev] [PATCH] flow: Verify that tot_len >= ip_len in miniflow_extract().url:https://mail.openvswitch.org/pipermail/ovs-dev/2016-July/319503.html

Trust: 0.8

title:Open vSwitch Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=70642

Trust: 0.6

sources: JVNDB: JVNDB-2016-008614 // CNNVD: CNNVD-201705-1376

EXTERNAL IDS

db:NVDid:CVE-2016-10377

Trust: 2.5

db:JVNDBid:JVNDB-2016-008614

Trust: 0.8

db:CNNVDid:CNNVD-201705-1376

Trust: 0.7

db:VULHUBid:VHN-89147

Trust: 0.1

sources: VULHUB: VHN-89147 // JVNDB: JVNDB-2016-008614 // CNNVD: CNNVD-201705-1376 // NVD: CVE-2016-10377

REFERENCES

url:https://mail.openvswitch.org/pipermail/ovs-dev/2016-july/319503.html

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-10377

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2016-10377

Trust: 0.8

sources: VULHUB: VHN-89147 // JVNDB: JVNDB-2016-008614 // CNNVD: CNNVD-201705-1376 // NVD: CVE-2016-10377

SOURCES

db:VULHUBid:VHN-89147
db:JVNDBid:JVNDB-2016-008614
db:CNNVDid:CNNVD-201705-1376
db:NVDid:CVE-2016-10377

LAST UPDATE DATE

2024-11-23T22:52:30.872000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-89147date:2017-06-08T00:00:00
db:JVNDBid:JVNDB-2016-008614date:2017-06-28T00:00:00
db:CNNVDid:CNNVD-201705-1376date:2017-05-31T00:00:00
db:NVDid:CVE-2016-10377date:2024-11-21T02:43:52.957

SOURCES RELEASE DATE

db:VULHUBid:VHN-89147date:2017-05-29T00:00:00
db:JVNDBid:JVNDB-2016-008614date:2017-06-28T00:00:00
db:CNNVDid:CNNVD-201705-1376date:2017-05-31T00:00:00
db:NVDid:CVE-2016-10377date:2017-05-29T04:29:00.243