Learn about CVE-2017-1000411, a vulnerability in OpenFlow Plugin and OpenDayLight Controller versions Nitrogen, Carbon, Boron, Robert Varga, Anil Vishnoi that allows attackers to crash the controller by overwhelming it with 'expired' flows.
A vulnerability in the OpenFlow Plugin and OpenDayLight Controller versions Nitrogen, Carbon, Boron, Robert Varga, Anil Vishnoi allows attackers to consume memory resources, leading to controller shutdown.
Understanding CVE-2017-1000411
This CVE describes a flaw in specific versions of the OpenFlow Plugin and OpenDayLight Controller that can be exploited to crash the controller by overwhelming it with 'expired' flows.
What is CVE-2017-1000411?
The vulnerability arises when multiple 'expired' flows occupy the memory resource of the CONFIG DATASTORE, causing the controller to shut down. Attackers can trigger this issue by sending various flows with 'idle-timeout' and 'hard-timeout' via the OpenFlow Plugin REST API.
The Impact of CVE-2017-1000411
Technical Details of CVE-2017-1000411
This section provides more in-depth technical insights into the vulnerability.
Vulnerability Description
The flaw allows attackers to exhaust the controller's resources by flooding it with expired flows, ultimately causing a shutdown.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Protecting systems from CVE-2017-1000411 requires immediate actions and long-term security practices.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates