Denial of Service attack when the switch rejects to receive packets from the controller. Component: This vulnerability affects OpenDaylight odl-l2switch-switch, which is the feature responsible for the OpenFlow communication. Version: OpenDaylight versions 3.3 (Lithium-SR3), 3.4 (Lithium-SR4), 4.0 (Beryllium), 4.1 (Beryllium-SR1), 4.2 (Beryllium-SR2), and 4.4 (Beryllium-SR4) are affected by this flaw. Java version is openjdk version 1.8.0_91.
References
Link | Resource |
---|---|
https://aaltodoc.aalto.fi/bitstream/handle/123456789/21584/master_Bidaj_Andi_2016.pdf | Exploit Technical Description Third Party Advisory |
https://aaltodoc.aalto.fi/bitstream/handle/123456789/21584/master_Bidaj_Andi_2016.pdf | Exploit Technical Description Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://aaltodoc.aalto.fi/bitstream/handle/123456789/21584/master_Bidaj_Andi_2016.pdf - Exploit, Technical Description, Third Party Advisory |
Information
Published : 2017-04-24 16:59
Updated : 2024-11-21 03:04
NVD link : CVE-2017-1000357
Mitre link : CVE-2017-1000357
CVE.ORG link : CVE-2017-1000357
JSON object : View
Products Affected
opendaylight
- opendaylight
CWE
CWE-400
Uncontrolled Resource Consumption