Vulnerability Description
Denial of Service attack when the switch rejects to receive packets from the controller. Component: This vulnerability affects OpenDaylight odl-l2switch-switch, which is the feature responsible for the OpenFlow communication. Version: OpenDaylight versions 3.3 (Lithium-SR3), 3.4 (Lithium-SR4), 4.0 (Beryllium), 4.1 (Beryllium-SR1), 4.2 (Beryllium-SR2), and 4.4 (Beryllium-SR4) are affected by this flaw. Java version is openjdk version 1.8.0_91.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Opendaylight | Opendaylight | 3.3 |
Related Weaknesses (CWE)
References
- https://aaltodoc.aalto.fi/bitstream/handle/123456789/21584/master_Bidaj_Andi_201ExploitTechnical DescriptionThird Party Advisory
- https://aaltodoc.aalto.fi/bitstream/handle/123456789/21584/master_Bidaj_Andi_201ExploitTechnical DescriptionThird Party Advisory
FAQ
What is CVE-2017-1000357?
CVE-2017-1000357 is a vulnerability with a CVSS score of 7.5 (HIGH). Denial of Service attack when the switch rejects to receive packets from the controller. Component: This vulnerability affects OpenDaylight odl-l2switch-switch, which is the feature responsible for th...
How severe is CVE-2017-1000357?
CVE-2017-1000357 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-1000357?
Check the references section above for vendor advisories and patch information. Affected products include: Opendaylight Opendaylight.