CVE-2015-1612

OpenFlow plugin for OpenDaylight before Helium SR3 allows remote attackers to spoof the SDN topology and affect the flow of data, related to the reuse of LLDP packets, aka "LLDP Relay."
Configurations

Configuration 1 (hide)

cpe:2.3:a:opendaylight:openflow:-:*:*:*:*:opendaylight:*:*

History

21 Nov 2024, 02:25

Type Values Removed Values Added
References () http://www.internetsociety.org/sites/default/files/10_4_2.pdf - Technical Description () http://www.internetsociety.org/sites/default/files/10_4_2.pdf - Technical Description
References () http://www.securityfocus.com/bid/73254 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/73254 - Third Party Advisory, VDB Entry
References () https://cloudrouter.org/security/ - Third Party Advisory () https://cloudrouter.org/security/ - Third Party Advisory
References () https://git.opendaylight.org/gerrit/#/c/16193/ - Issue Tracking, Patch, Third Party Advisory () https://git.opendaylight.org/gerrit/#/c/16193/ - Issue Tracking, Patch, Third Party Advisory
References () https://git.opendaylight.org/gerrit/#/c/16208/ - Issue Tracking, Patch, Third Party Advisory () https://git.opendaylight.org/gerrit/#/c/16208/ - Issue Tracking, Patch, Third Party Advisory
References () https://wiki.opendaylight.org/view/Security_Advisories#.5BModerate.5D_CVE-2015-1611_CVE-2015-1612_openflowplugin:_topology_spoofing_via_LLDP - Patch, Third Party Advisory () https://wiki.opendaylight.org/view/Security_Advisories#.5BModerate.5D_CVE-2015-1611_CVE-2015-1612_openflowplugin:_topology_spoofing_via_LLDP - Patch, Third Party Advisory

Information

Published : 2017-04-04 17:59

Updated : 2024-11-21 02:25


NVD link : CVE-2015-1612

Mitre link : CVE-2015-1612

CVE.ORG link : CVE-2015-1612


JSON object : View

Products Affected

opendaylight

  • openflow
CWE
CWE-20

Improper Input Validation