Miggo Logo

CVE-2020-35139: FaucetSDN Ryu Denial of Service Vulnerability

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.4171%
Published
8/11/2023
Updated
11/11/2023
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
ryupip<= 4.34

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The GitHub issue #118 explicitly identifies the OFPQueueGetConfigReply parser loop in ofproto_v1_3_parser.py as vulnerable when queue.len=0. Though the CVE description mentions OFPBundleCtrlMsg, the primary source (issue tracker) and code analysis confirm the loop in OFPQueueGetConfigReply's parser lacks validation for zero-length queue entries, directly causing the infinite loop described in the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*n issu* w*s *is*ov*r** in `O*P*un*l**trlMs*` in `p*rs*r.py` in **u**tS*N Ryu v*rsion *.**, *llows r*mot* *tt**k*rs to **us* * **ni*l o* s*rvi** (*oS) (in*init* loop).

Reasoning

T** *it*u* issu* #*** *xpli*itly i**nti*i*s t** O*PQu*u***t*on*i*R*ply p*rs*r loop in o*proto_v*_*_p*rs*r.py *s vuln*r**l* w**n qu*u*.l*n=*. T*ou** t** *V* **s*ription m*ntions O*P*un*l**trlMs*, t** prim*ry sour** (issu* tr**k*r) *n* *o** *n*lysis *o
CVE-2020-35139: FaucetSDN Ryu Parser Loop DoS | Miggo