// For flags

CVE-2020-35498

openvswitch: limitation in the OVS packet parsing in userspace leads to DoS

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.

Se encontró una vulnerabilidad en openvswitch. Una limitación en la implementación del análisis de paquetes del espacio de usuario puede permitir a un usuario malicioso envíe un paquete especialmente diseñado, lo que hace que el megaflujo resultante en el kernel sea demasiado amplio, causando potencialmente una denegación de servicio. La mayor amenaza de esta vulnerabilidad es la disponibilidad del sistema

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-12-17 CVE Reserved
  • 2021-02-11 CVE Published
  • 2024-02-29 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-400: Uncontrolled Resource Consumption
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Openvswitch
Search vendor "Openvswitch"
Openvswitch
Search vendor "Openvswitch" for product "Openvswitch"
>= 2.5.0 < 2.5.12
Search vendor "Openvswitch" for product "Openvswitch" and version " >= 2.5.0 < 2.5.12"
-
Affected
Openvswitch
Search vendor "Openvswitch"
Openvswitch
Search vendor "Openvswitch" for product "Openvswitch"
>= 2.6.0 < 2.6.10
Search vendor "Openvswitch" for product "Openvswitch" and version " >= 2.6.0 < 2.6.10"
-
Affected
Openvswitch
Search vendor "Openvswitch"
Openvswitch
Search vendor "Openvswitch" for product "Openvswitch"
>= 2.7.0 < 2.7.13
Search vendor "Openvswitch" for product "Openvswitch" and version " >= 2.7.0 < 2.7.13"
-
Affected
Openvswitch
Search vendor "Openvswitch"
Openvswitch
Search vendor "Openvswitch" for product "Openvswitch"
>= 2.8.0 < 2.8.11
Search vendor "Openvswitch" for product "Openvswitch" and version " >= 2.8.0 < 2.8.11"
-
Affected
Openvswitch
Search vendor "Openvswitch"
Openvswitch
Search vendor "Openvswitch" for product "Openvswitch"
>= 2.9.0 < 2.9.9
Search vendor "Openvswitch" for product "Openvswitch" and version " >= 2.9.0 < 2.9.9"
-
Affected
Openvswitch
Search vendor "Openvswitch"
Openvswitch
Search vendor "Openvswitch" for product "Openvswitch"
>= 2.10.0 < 2.10.7
Search vendor "Openvswitch" for product "Openvswitch" and version " >= 2.10.0 < 2.10.7"
-
Affected
Openvswitch
Search vendor "Openvswitch"
Openvswitch
Search vendor "Openvswitch" for product "Openvswitch"
>= 2.11.0 < 2.11.6
Search vendor "Openvswitch" for product "Openvswitch" and version " >= 2.11.0 < 2.11.6"
-
Affected
Openvswitch
Search vendor "Openvswitch"
Openvswitch
Search vendor "Openvswitch" for product "Openvswitch"
>= 2.12.0 < 2.12.3
Search vendor "Openvswitch" for product "Openvswitch" and version " >= 2.12.0 < 2.12.3"
-
Affected
Openvswitch
Search vendor "Openvswitch"
Openvswitch
Search vendor "Openvswitch" for product "Openvswitch"
>= 2.13.0 < 2.13.3
Search vendor "Openvswitch" for product "Openvswitch" and version " >= 2.13.0 < 2.13.3"
-
Affected
Openvswitch
Search vendor "Openvswitch"
Openvswitch
Search vendor "Openvswitch" for product "Openvswitch"
>= 2.14.0 < 2.14.2
Search vendor "Openvswitch" for product "Openvswitch" and version " >= 2.14.0 < 2.14.2"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
9.0
Search vendor "Debian" for product "Debian Linux" and version "9.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
10.0
Search vendor "Debian" for product "Debian Linux" and version "10.0"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
33
Search vendor "Fedoraproject" for product "Fedora" and version "33"
-
Affected