Learn about CVE-2020-18684, an integer overflow vulnerability in Floodlight through 1.2 via priority or port number manipulation. Find mitigation steps and prevention measures.
Floodlight through 1.2 has an integer overflow vulnerability in checkFlow in StaticFlowEntryPusherResource.java via priority or port number.
Understanding CVE-2020-18684
This CVE entry describes a specific vulnerability in Floodlight through version 1.2 that can be exploited through an integer overflow in the checkFlow function within StaticFlowEntryPusherResource.java.
What is CVE-2020-18684?
The CVE-2020-18684 vulnerability involves an integer overflow issue in Floodlight, specifically in the checkFlow function within StaticFlowEntryPusherResource.java. This vulnerability can be triggered via priority or port number manipulation.
The Impact of CVE-2020-18684
The vulnerability could allow an attacker to execute arbitrary code or cause a denial of service (DoS) condition by exploiting the integer overflow in Floodlight.
Technical Details of CVE-2020-18684
Vulnerability Description
The vulnerability in Floodlight through version 1.2 arises from an integer overflow in the checkFlow function in StaticFlowEntryPusherResource.java, which can be manipulated through priority or port number.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited by manipulating the priority or port number in the checkFlow function of Floodlight through version 1.2.
Mitigation and Prevention
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
It is crucial to stay informed about security updates released by the vendor for Floodlight to address the CVE-2020-18684 vulnerability.