Security News > 2017 > August > VMware Patches 'Hard-to-Exploit' DoS Vulnerability (Security Week)
2017-08-14 10:00
An update released by VMware for its NSX-V network virtualization solution patches an important denial-of-service (DoS) vulnerability. The security hole, tracked as CVE-2017-4920, exists in the OSPF protocol implementation in NSX-V due to it not handling link-state advertisement (LSA) correctly. read more
News URL
Related news
- Proof-of-Concept Exploit Released for Progress Software OpenEdge Vulnerability (source)
- PoC exploit for critical Fortra FileCatalyst MFT vulnerability released (CVE-2024-25153) (source)
- GoFetch security exploit can't be disabled on M1 and M2 Apple chips (source)
- Security Vulnerability in Saflok’s RFID-Based Keycard Locks (source)
- Ivanti fixes VPN gateway vulnerability allowing RCE, DoS attacks (source)
- New HTTP/2 Vulnerability Exposes Web Servers to DoS Attacks (source)
- Security Vulnerability of HTML Emails (source)
- Fortinet Rolls Out Critical Security Patches for FortiClientLinux Vulnerability (source)
- OpenAI's GPT-4 can exploit real vulnerabilities by reading security advisories (source)
- Prompt Hacking, Private GPTs, Zero-Day Exploits and Deepfakes: Report Reveals the Impact of AI on Cyber Security Landscape (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-12-05 | CVE-2017-4920 | Resource Exhaustion vulnerability in VMWare Nsx-V Edge The implementation of the OSPF protocol in VMware NSX-V Edge 6.2.x prior to 6.2.8 and NSX-V Edge 6.3.x prior to 6.3.3 doesn't correctly handle the link-state advertisement (LSA). | 7.1 |