| CVE-ID |
CVE-2017-1000411
|
• CVSS Severity Rating • Fix Information • Vulnerable Software Versions • SCAP Mappings • CPE Information
|
| Description |
| OpenFlow Plugin and OpenDayLight Controller versions Nitrogen, Carbon,
Boron, Robert Varga, Anil Vishnoi contain a flaw when multiple
'expired' flows take up the memory resource of CONFIG DATASTORE which
leads to CONTROLLER shutdown. If multiple different flows with
'idle-timeout' and 'hard-timeout' are sent to the Openflow Plugin REST
API, the expired flows will eventually crash the controller once its
resource allocations set with the JVM size are exceeded. Although the
installed flows (with timeout set) are removed from network (and thus
also from controller's operations DS), the expired entries are still
present in CONFIG DS. The attack can originate both from NORTH or
SOUTH. The above description is for a north bound attack. A south
bound attack can originate when an attacker attempts a flow flooding
attack and since flows come with timeouts, the attack is not
successful. However, the attacker will now be successful in CONTROLLER
overflow attack (resource consumption). Although, the network (actual
flow tables) and operational DS are only (~)1% occupied, the
controller requests for resource consumption. This happens because the
installed flows get removed from the network upon timeout.
|
| References |
|
Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete.
|
|
|
| Assigning CNA |
| Distributed Weakness Filing Project |
| Date Entry Created |
| 20171228 |
Disclaimer: The entry creation date may reflect when
the CVE ID was allocated or reserved, and does not
necessarily indicate when this vulnerability was
discovered, shared with the affected vendor, publicly
disclosed, or updated in CVE.
|
| Phase (Legacy) |
| Assigned (20171228) |
| Votes (Legacy) |
|
| Comments (Legacy) |
|
| Proposed (Legacy) |
| N/A |
|
This is an entry on the CVE List, which provides common identifiers for publicly known cybersecurity vulnerabilities. |
|
|
|
For More Information: cve@mitre.org
|