VYPR

Opendaylight

by Opendaylight

CVEs (7)

  • CVE-2015-1778CriJun 27, 2017
    risk 0.64cvss 9.8epss 0.03

    The custom authentication realm used by karaf-tomcat's "opendaylight" realm in Opendaylight before Helium SR3 will authenticate any username and password combination.

  • CVE-2017-1000361HigApr 24, 2017
    risk 0.49cvss 7.5epss 0.00

    DOMRpcImplementationNotAvailableException when sending Port-Status packets to OpenDaylight. Controller launches exceptions and consumes more CPU resources. Component: OpenDaylight is vulnerable to this flaw. Version: The tested versions are OpenDaylight 3.3 and 4.0.

  • CVE-2017-1000357HigApr 24, 2017
    risk 0.49cvss 7.5epss 0.00

    Denial of Service attack when the switch rejects to receive packets from the controller. Component: This vulnerability affects OpenDaylight odl-l2switch-switch, which is the feature responsible for the OpenFlow communication. Version: OpenDaylight versions 3.3 (Lithium-SR3), 3.4 (Lithium-SR4), 4.0 (Beryllium), 4.1 (Beryllium-SR1), 4.2 (Beryllium-SR2), and 4.4 (Beryllium-SR4) are affected by this flaw. Java version is openjdk version 1.8.0_91.

  • CVE-2017-1000360MedApr 24, 2017
    risk 0.34cvss 5.3epss 0.00

    StreamCorruptedException and NullPointerException in OpenDaylight odl-mdsal-xsql. Controller launches exceptions in the console. Component: OpenDaylight odl-mdsal-xsql is vulnerable to this flaw. Version: The tested versions are OpenDaylight 3.3 and 4.0.

  • CVE-2017-1000359MedApr 24, 2017
    risk 0.34cvss 5.3epss 0.00

    Java out of memory error and significant increase in resource consumption. Component: OpenDaylight odl-mdsal-xsql is vulnerable to this flaw. Version: The tested versions are OpenDaylight 3.3 and 4.0.

  • CVE-2018-1078Mar 16, 2018
    risk 0.00cvss epss 0.00

    OpenDayLight version Carbon SR3 and earlier contain a vulnerability during node reconciliation that can result in traffic flows that should be expired or should expire shortly being re-installed and their timers reset resulting in traffic being allowed that should be expired.

  • CVE-2014-5035Aug 26, 2014
    risk 0.00cvss epss 0.01

    The Netconf (TCP) service in OpenDaylight 1.0 allows remote attackers to read arbitrary files via an XML external entity declaration in conjunction with an entity reference in an XML-RPC message, related to an XML External Entity (XXE) issue.