Lucene search

K
gentooGentoo FoundationGLSA-200503-25
HistoryMar 20, 2005 - 12:00 a.m.

OpenSLP: Multiple buffer overflows

2005-03-2000:00:00
Gentoo Foundation
security.gentoo.org
6

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.015 Low

EPSS

Percentile

87.1%

Background

OpenSLP is an open-source implementation of Service Location Protocol (SLP).

Description

Multiple buffer overflows have been found in OpenSLP, when handling malformed SLP packets.

Impact

By sending specially crafted SLP packets, a remote attacker could potentially execute arbitrary code with the rights of the OpenSLP daemon.

Workaround

There is no known workaround at this time.

Resolution

All OpenSLP users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-libs/openslp-1.2.1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-libs/openslp< 1.2.1UNKNOWN

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.015 Low

EPSS

Percentile

87.1%