CVE-2020-35498
HIGHopenvswitch 2.5.0-2.5.11 - Denial of Service via Crafted Packet Megaflow Width
Title source: llmExploitation Summary
EIP tracks 1 public exploit for CVE-2020-35498. PoCs published by freddierice.
AI-analyzed exploit summary This repository contains a functional proof-of-concept exploit for CVE-2020-35498, which involves crafting and sending malformed ICMP packets with excessive padding to trigger a vulnerability. The PoC includes both a trigger (Go-based) and a capture tool (C-based with BPF filtering) to detect the exploit attempt.
Description
A vulnerability was found in openvswitch. A limitation in the implementation of userspace packet parsing can allow a malicious user to send a specially crafted packet causing the resulting megaflow in the kernel to be too wide, potentially causing a denial of service. The highest threat from this vulnerability is to system availability.
Exploits (1)
This repository contains a functional proof-of-concept exploit for CVE-2020-35498, which involves crafting and sending malformed ICMP packets with excessive padding to trigger a vulnerability. The PoC includes both a trigger (Go-based) and a capture tool (C-based with BPF filtering) to detect the exploit attempt.
References (6)
Scores
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H