CVE-2016-2074

Published on: 07/03/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:16 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Certain versions of Openvswitch from Openvswitch contain the following vulnerability:

Buffer overflow in lib/flow.c in ovs-vswitchd in Open vSwitch 2.2.x and 2.3.x before 2.3.3 and 2.4.x before 2.4.1 allows remote attackers to execute arbitrary code via crafted MPLS packets, as demonstrated by a long string in an ovs-appctl command.

  • CVE-2016-2074 has been assigned by [email protected] to track the vulnerability - currently rated as - currently rated as CRITICAL severity.

CVSS3 Score: 9.8 - CRITICAL

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 7.5 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
PARTIAL PARTIAL PARTIAL

CVE References

Description Tags Link
Red Hat Customer Portal web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:0524
1318553 – (CVE-2016-2074) CVE-2016-2074 openvswitch: MPLS buffer overflow vulnerability bugzilla.redhat.com
text/html
URL Logo CONFIRM bugzilla.redhat.com/show_bug.cgi?id=1318553
Red Hat Customer Portal web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:0523
Open vSwitch: Remote execution of arbitrary code (GLSA 201701-07) — Gentoo security security.gentoo.org
text/html
URL Logo GENTOO GLSA-201701-07
CVE-2016-2074 security-tracker.debian.org
text/html
URL Logo CONFIRM security-tracker.debian.org/tracker/CVE-2016-2074
Debian -- Security Information -- DSA-3533-1 openvswitch www.debian.org
Depreciated Link
text/html
URL Logo DEBIAN DSA-3533
[ovs-announce] Open vSwitch 2.4.1 and 2.3.3 Available Patch
web.archive.org
text/html
Inactive LinkNot Archived
URL Logo MLIST [ovs-announce] 20160328 Open vSwitch 2.4.1 and 2.3.3 Available
[ovs-announce] CVE-2016-2074: MPLS buffer overflow vulnerabilities in Open vSwitch Vendor Advisory
web.archive.org
text/html
Inactive LinkNot Archived
URL Logo MLIST [ovs-announce] 20160328 CVE-2016-2074: MPLS buffer overflow vulnerabilities in Open vSwitch
Red Hat Customer Portal web.archive.org
text/html
Inactive LinkNot Archived
URL Logo REDHAT RHSA-2016:0537
Open vSwitch CVE-2016-2074 Multiple Buffer Overflow Vulnerabilities cve.report (archive)
text/html
URL Logo BID 85700
Red Hat Customer Portal access.redhat.com
text/html
URL Logo REDHAT RHSA-2016:0615
Citrix XenServer Multiple Security Updates support.citrix.com
text/html
URL Logo CONFIRM support.citrix.com/article/CTX232655

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationOpenvswitchOpenvswitch2.2.0AllAllAll
ApplicationOpenvswitchOpenvswitch2.3.0AllAllAll
ApplicationOpenvswitchOpenvswitch2.3.1AllAllAll
ApplicationOpenvswitchOpenvswitch2.3.2AllAllAll
ApplicationOpenvswitchOpenvswitch2.4.0AllAllAll
ApplicationOpenvswitchOpenvswitch2.2.0AllAllAll
ApplicationOpenvswitchOpenvswitch2.3.0AllAllAll
ApplicationOpenvswitchOpenvswitch2.3.1AllAllAll
ApplicationOpenvswitchOpenvswitch2.3.2AllAllAll
ApplicationOpenvswitchOpenvswitch2.4.0AllAllAll
ApplicationRedhatOpenshift3.1AllAllAll
ApplicationRedhatOpenshift3.1AllAllAll
  • cpe:2.3:a:openvswitch:openvswitch:2.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:openvswitch:openvswitch:2.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:openvswitch:openvswitch:2.3.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:openvswitch:openvswitch:2.3.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:openvswitch:openvswitch:2.4.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:openvswitch:openvswitch:2.2.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:openvswitch:openvswitch:2.3.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:openvswitch:openvswitch:2.3.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:openvswitch:openvswitch:2.3.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:openvswitch:openvswitch:2.4.0:*:*:*:*:*:*:*:
  • cpe:2.3:a:redhat:openshift:3.1:*:*:*:enterprise:*:*:*:
  • cpe:2.3:a:redhat:openshift:3.1:*:*:*:enterprise:*:*:*: