hosttracker in OpenDaylight l2switch allows remote attackers to change the host location information by spoofing the MAC address, aka "topology spoofing."
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
https://wiki.opendaylight.org/view/Security_Advisories#.5BModerate.5D_CVE-2015-1610_l2switch:_topology_spoofing_via_hosttracker | vendor advisory |
http://www.internetsociety.org/sites/default/files/10_4_2.pdf | technical description |
http://www.securityfocus.com/bid/73251 | vdb entry third party advisory |