Atlassian Floodlight Atlassian Floodlight Controller version 1.2 and earlier versions contains a Denial of Service vulnerability in Forwarding module that can result in Improper type cast in Forwarding module allows remote attackers to cause a DoS(thread crash).. This attack appear to be exploitable via network connectivity (Remote attack).
References
Link | Resource |
---|---|
http://gms.cl0udz.com/Floodlight_DoS.pdf | Exploit Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/104711 | Third Party Advisory VDB Entry |
http://gms.cl0udz.com/Floodlight_DoS.pdf | Exploit Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/104711 | Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 03:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://gms.cl0udz.com/Floodlight_DoS.pdf - Exploit, Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/104711 - Third Party Advisory, VDB Entry |
Information
Published : 2018-07-09 20:29
Updated : 2024-11-21 03:40
NVD link : CVE-2018-1000617
Mitre link : CVE-2018-1000617
CVE.ORG link : CVE-2018-1000617
JSON object : View
Products Affected
atlassian
- floodlight_controller
CWE
CWE-20
Improper Input Validation