Vulnerability Description
Buffer overflow in lib/flow.c in ovs-vswitchd in Open vSwitch 2.2.x and 2.3.x before 2.3.3 and 2.4.x before 2.4.1 allows remote attackers to execute arbitrary code via crafted MPLS packets, as demonstrated by a long string in an ovs-appctl command.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openvswitch | Openvswitch | 2.2.0 |
| Redhat | Openshift | 3.1 |
Related Weaknesses (CWE)
References
- http://openvswitch.org/pipermail/announce/2016-March/000082.htmlVendor Advisory
- http://openvswitch.org/pipermail/announce/2016-March/000083.htmlPatch
- http://rhn.redhat.com/errata/RHSA-2016-0523.html
- http://rhn.redhat.com/errata/RHSA-2016-0524.html
- http://rhn.redhat.com/errata/RHSA-2016-0537.html
- http://www.debian.org/security/2016/dsa-3533
- http://www.securityfocus.com/bid/85700
- https://access.redhat.com/errata/RHSA-2016:0615
- https://bugzilla.redhat.com/show_bug.cgi?id=1318553
- https://security-tracker.debian.org/tracker/CVE-2016-2074
- https://security.gentoo.org/glsa/201701-07
- https://support.citrix.com/article/CTX232655
- http://openvswitch.org/pipermail/announce/2016-March/000082.htmlVendor Advisory
- http://openvswitch.org/pipermail/announce/2016-March/000083.htmlPatch
- http://rhn.redhat.com/errata/RHSA-2016-0523.html
FAQ
What is CVE-2016-2074?
CVE-2016-2074 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Buffer overflow in lib/flow.c in ovs-vswitchd in Open vSwitch 2.2.x and 2.3.x before 2.3.3 and 2.4.x before 2.4.1 allows remote attackers to execute arbitrary code via crafted MPLS packets, as demonst...
How severe is CVE-2016-2074?
CVE-2016-2074 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2016-2074?
Check the references section above for vendor advisories and patch information. Affected products include: Openvswitch Openvswitch, Redhat Openshift.