cvelist/2019/25xxx/CVE-2019-25076.json
2022-09-08 23:00:35 +00:00

82 lines
2.7 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-25076",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The TSS (Tuple Space Search) algorithm in Open vSwitch 2.x through 2.17.2 and 3.0.0 allows remote attackers to cause a denial of service (delays of legitimate traffic) via crafted packet data that requires excessive evaluation time within the packet classification algorithm for the MegaFlow cache, aka a Tuple Space Explosion (TSE) attack."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://sites.google.com/view/tuple-space-explosion",
"refsource": "MISC",
"name": "https://sites.google.com/view/tuple-space-explosion"
},
{
"url": "https://dl.acm.org/citation.cfm?doid=3359989.3365431",
"refsource": "MISC",
"name": "https://dl.acm.org/citation.cfm?doid=3359989.3365431"
},
{
"url": "https://arxiv.org/abs/2011.09107",
"refsource": "MISC",
"name": "https://arxiv.org/abs/2011.09107"
},
{
"url": "https://www.youtube.com/watch?v=DSC3m-Bww64",
"refsource": "MISC",
"name": "https://www.youtube.com/watch?v=DSC3m-Bww64"
},
{
"url": "https://www.youtube.com/watch?v=5cHpzVK0D28",
"refsource": "MISC",
"name": "https://www.youtube.com/watch?v=5cHpzVK0D28"
}
]
}
}