CVE-2017-1000358
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2017-1000358 from the MITRE CVE dictionary dictionary and NIST NVD.
Statement
This issue affects OpenDaylight in Red Hat OpenStack Platform 12.0 (Pike). However, OpenDaylight is only supported in segregated management networks; by default, at worst, this flaw would only be exposed on an admin network. For this reason, Red Hat Product Security has rated this issue as having security impact of Low. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
CVSS v3 metrics
NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.
| CVSS3 Base Score | 5.3 |
|---|---|
| CVSS3 Base Metrics | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
| Attack Vector | Network |
| Attack Complexity | Low |
| Privileges Required | None |
| User Interaction | None |
| Scope | Unchanged |
| Confidentiality | None |
| Integrity Impact | None |
| Availability Impact | Low |
Affected Packages State
| Platform | Package | State |
|---|---|---|
| Red Hat OpenStack Platform 9.0 | opendaylight | Will not fix |
| Red Hat OpenStack Platform 8.0 (Liberty) | opendaylight | Will not fix |
| Red Hat OpenStack Platform 12.0 | opendaylight | Will not fix |
| Red Hat OpenStack Platform 11.0 (Ocata) | opendaylight | Will not fix |
| Red Hat OpenStack Platform 10 | opendaylight | Will not fix |
Acknowledgements
Red Hat would like to thank OpenDaylight project for reporting this issue. Upstream acknowledges Andi Bidaj as the original reporter.CVE description copyright © 2017, The MITRE Corporation
