Discover the impact of CVE-2018-17204 on Open vSwitch versions 2.7.x to 2.7.6. Learn about the vulnerability in parse_group_prop_ntr_selection_method and how to mitigate the issue.
Open vSwitch (OvS) versions 2.7.x to 2.7.6 are affected by a vulnerability in the parse_group_prop_ntr_selection_method function within the lib/ofp-util.c file. This issue can lead to an assertion failure, impacting the OpenFlow 1.5 support.
Understanding CVE-2018-17204
This CVE identifies a specific vulnerability in Open vSwitch versions 2.7.x to 2.7.6 that affects the parsing of group mod commands.
What is CVE-2018-17204?
An issue has been discovered in Open vSwitch versions 2.7.x through 2.7.6, specifically in the parse_group_prop_ntr_selection_method function within the lib/ofp-util.c file. The problem arises during the decoding process of a group mod, leading to an assertion failure.
The Impact of CVE-2018-17204
The vulnerability can result in an assertion failure (via OVS_NOT_REACHED) due to improper handling of group type and command validation, affecting OpenFlow 1.5 support.
Technical Details of CVE-2018-17204
Open vSwitch vulnerability details and affected systems.
Vulnerability Description
The issue occurs in the parse_group_prop_ntr_selection_method function within the lib/ofp-util.c file, impacting the decoding process of group mod commands.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability allows for an assertion failure due to premature utilization of group type and command during the decoding process.
Mitigation and Prevention
Steps to mitigate and prevent the CVE-2018-17204 vulnerability.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates