hosttracker in OpenDaylight l2switch allows remote attackers to change the host location information by spoofing the MAC address, aka "topology spoofing."
References
Link | Resource |
---|---|
http://www.internetsociety.org/sites/default/files/10_4_2.pdf | Technical Description |
http://www.securityfocus.com/bid/73251 | Third Party Advisory VDB Entry |
https://wiki.opendaylight.org/view/Security_Advisories#.5BModerate.5D_CVE-2015-1610_l2switch:_topology_spoofing_via_hosttracker | Vendor Advisory |
http://www.internetsociety.org/sites/default/files/10_4_2.pdf | Technical Description |
http://www.securityfocus.com/bid/73251 | Third Party Advisory VDB Entry |
https://wiki.opendaylight.org/view/Security_Advisories#.5BModerate.5D_CVE-2015-1610_l2switch:_topology_spoofing_via_hosttracker | Vendor Advisory |
Configurations
History
21 Nov 2024, 02:25
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.internetsociety.org/sites/default/files/10_4_2.pdf - Technical Description | |
References | () http://www.securityfocus.com/bid/73251 - Third Party Advisory, VDB Entry | |
References | () https://wiki.opendaylight.org/view/Security_Advisories#.5BModerate.5D_CVE-2015-1610_l2switch:_topology_spoofing_via_hosttracker - Vendor Advisory |
Information
Published : 2017-03-20 16:59
Updated : 2024-11-21 02:25
NVD link : CVE-2015-1610
Mitre link : CVE-2015-1610
CVE.ORG link : CVE-2015-1610
JSON object : View
Products Affected
opendaylight
- l2switch
CWE
CWE-264
Permissions, Privileges, and Access Controls