vulnerability

FreeBSD: VID-b53bbf58-257f-11e6-9f4d-20cf30e32f6d (CVE-2016-2074): openvswitch -- MPLS buffer overflow

Severity
7
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
May 29, 2016
Added
Dec 10, 2025
Modified
Dec 10, 2025

Description

Open vSwitch reports: Multiple versions of Open vSwitch are vulnerable to remote buffer overflow attacks, in which crafted MPLS packets could overflow the buffer reserved for MPLS labels in an OVS internal data structure. The MPLS packets that trigger the vulnerability and the potential for exploitation vary depending on version: Open vSwitch 2.1.x and earlier are not vulnerable. In Open vSwitch 2.2.x and 2.3.x, the MPLS buffer overflow can be exploited for arbitrary remote code execution. In Open vSwitch 2.4.x, the MPLS buffer overflow does not obviously lead to a remote code execution exploit, but testing shows that it can allow a remote denial of service. See the mitigation section for details. Open vSwitch 2.5.x is not vulnerable.

Solution

freebsd-upgrade-package-openvswitch
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.