CVE-2018-1078

Related Vulnerabilities: CVE-2018-1078  

It was found that all flows, including active and inactive, in the config datastore are installed back in the switch upon reconnection, as part of the node reconciliation process in OpenDayLight. This may lead to denial of service via table overflow or possibly circumventing of the controller's control.

It was found that all flows, including active and inactive, in the config datastore are installed back in the switch upon reconnection, as part of the node reconciliation process in OpenDayLight. This may lead to denial of service via table overflow or possibly circumventing of the controller's control.

Find out more about CVE-2018-1078 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.

CVSS3 Base Score 4.8
CVSS3 Base Metrics CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Attack Vector Adjacent Network
Attack Complexity High
Privileges Required Low
User Interaction None
Scope Unchanged
Confidentiality None
Integrity Impact None
Availability Impact High

Affected Packages State

Platform Package State
Red Hat OpenStack Platform 9.0 opendaylight Affected
Red Hat OpenStack Platform 8.0 (Liberty) opendaylight Affected
Red Hat OpenStack Platform 13.0 (Queens) opendaylight Affected
Red Hat OpenStack Platform 12.0 opendaylight Affected
Red Hat OpenStack Platform 11.0 (Ocata) opendaylight Affected
Red Hat OpenStack Platform 10 opendaylight Affected

Acknowledgements

Red Hat would like to thank Vaibhav Hemant Dixit (Arizona State University) for reporting this issue.