7.8
CVSSv2

CVE-2020-35498

Published: 11/02/2021 Updated: 26/11/2023
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

openvswitch openvswitch

debian debian linux 9.0

debian debian linux 10.0

fedoraproject fedora 33

Vendor Advisories

Synopsis Moderate: openvswitch213 security and bug fix update Type/Severity Security Advisory: Moderate Topic An update for openvswitch213 is now available for Fast Datapath for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vuln ...
Debian Bug report logs - #982493 openvswitch: CVE-2020-35498 Package: src:openvswitch; Maintainer for src:openvswitch is Debian OpenStack <team+openstack@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 10 Feb 2021 20:03:01 UTC Severity: grave Tags: security, upstream Found in ve ...
Joakim Hindersson discovered that Open vSwitch, a software-based Ethernet virtual switch, allowed a malicious user to cause a denial-of-service by sending a specially crafted packet For the stable distribution (buster), this problem has been fixed in version 2107+ds1-0+deb10u1 We recommend that you upgrade your openvswitch packages For the det ...
Multiple versions of Open vSwitch are vulnerable to potential problems like denial of service attacks, in which crafted network packets could cause the packet lookup to ignore network header fields from layers 3 and 4 The crafted network packet is an ordinary IPv4 or IPv6 packet with Ethernet padding length above 255 bytes This causes the packet ...
Two security issues have been identified in Citrix Hypervisor (formerly Citrix XenServer) that may allow privileged code in a guest VM to cause the host to crash or become unresponsive ...

Github Repositories

Flag the cve-2020-35498 attack

cve-2020-35498-flag Flag the cve-2020-35498 attack Build Requires gcc and go make Filter The filter was built with bpf_asm and placed in filterc Catch the vulnerability with sudo /target/catch Trigger with Trigger the vulnerability through interface wlan0 with destination aa:bb:cc:dd:ee:ff sudo