VYPR
Moderate severityNVD Advisory· Published May 5, 2024· Updated Nov 20, 2024

CVE-2024-34484

CVE-2024-34484

Description

OFPBucket in parser.py in Faucet SDN Ryu 4.34 allows attackers to cause a denial of service (infinite loop) via action.len=0.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CVE-2024-34484: Faucet SDN Ryu 4.34 OFPBucket parser infinite loop via crafted action.len=0 causes denial of service.

CVE-2024-34484 is a denial-of-service (DoS) vulnerability in the Faucet SDN Ryu framework, version 4.34. The issue resides in the OFPBucket.parser method within /ryu/ofproto/ofproto_v1_3_parser.py. When parsing an OFPBucket, the method uses a while loop that increments offset and length by action.len for each parsed action. However, if an attacker sets action.len to zero, the loop never progresses, resulting in an infinite loop and resource exhaustion [1][3].

Exploitation

An attacker can trigger this vulnerability by sending a crafted OpenFlow message, specifically an OFPGroupDescStatsReply containing an OFPGroupDescStats structure with a malicious OFPBucket. The proof-of-concept (PoC) demonstrates sending such a packet to a Ryu controller listening on the default OpenFlow port (6633). No authentication is required to send OpenFlow messages; an attacker with network access to the controller can exploit this without prior credentials [3].

Impact

Successful exploitation causes the Ryu controller to enter an infinite loop, consuming 100% CPU and effectively halting processing of legitimate OpenFlow messages. This results in a denial of service for the controller, disrupting network operations and management in SDN environments relying on Ryu [1][3].

Mitigation

The Ryu project is no longer actively maintained. The GitHub repository states, 'RYU NOT CURRENTLY MAINTAINED' and recommends migrating to a maintained fork, such as OpenStack's os-ken [2]. No official patch is available for this CVE. Users of Ryu should consider migrating to the os-ken framework or implementing network-level filtering to block malformed OpenFlow messages from untrusted sources [2][3].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
ryuPyPI
<= 4.34

Affected products

2
  • Faucet SDN/Faucet SDN Ryudescription
  • ghsa-coords
    Range: <= 4.34

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.