VMware released a patch for its NSX-V network virtualization solution that patches a denial-of-service (DoS) vulnerability.
The security hole, tracked as CVE-2017-4920, exists in the OSPF protocol implementation in NSX-V due to it not handling link-state advertisement (LSA) correctly.
“A rogue LSA may exploit this issue resulting in continuous sending of LSAs between two routers eventually going in loop or loss of connectivity,” VMware said in its advisory.
“The issue cannot be exploited in case the OSPF protocol is not configured,” the advisory said. “At setup time, no particular protocol is configured.”
VMware said the vulnerability is “hard to exploit.” One mitigating factor is an attacker requires local access to the targeted system in order to leverage the vulnerability.
The flaw affects VMware NSX-V Edge 6.2.x and 6.3.x running on any platform. Patches are in versions 6.2.8 and 6.3.3.
Adi Sosnovich, Orna Grumberg and Gabi Nakibly have been credited for reporting the vulnerability.