9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
openslp is vulnerable to remote code execution. A heap-based buffer overflow in the ProcessSrvRqst()
function in slpd_process.c
allows an attacker to execute arbitrary code on the system.
CPE | Name | Operator | Version |
---|---|---|---|
openslp | eq | 2.0.0__7.el7_5 | |
openslp | eq | 2.0.0__7.el7_5 |
www.openwall.com/lists/oss-security/2019/12/10/2
www.openwall.com/lists/oss-security/2019/12/11/2
www.vmware.com/security/advisories/VMSA-2019-0022.html
access.redhat.com/errata/RHSA-2019:4240
access.redhat.com/errata/RHSA-2020:0199
access.redhat.com/security/updates/classification/#critical
lists.fedoraproject.org/archives/list/[email protected]/message/DA3LYAJ2NRKMOZLZOQNDJ5TNQRFMWGHF/
lists.fedoraproject.org/archives/list/[email protected]/message/ZPXXJZLPLAQULBCJVI5NNWZ3PGWXGXWG/
security.gentoo.org/glsa/202005-12
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P