CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
EPSS
Percentile
97.2%
OpenSLP contains a vulnerability in the handling of packets containing malformed extensions, which can result in a denial-of-service condition.
Service Location Protocol is an IETF standards track protocol that provides a framework to allow networking applications to discover the existence, location, and configuration of networked services in enterprise networks. The OpenSLP project is an effort to develop an open-source implementation of Service Location Protocol. When OpenSLP parses a SLP packet containing malformed extensions the extensions parser will enter an infinite loop causing a denial-of-service condition.
If an attacker creates a packet containing a “next extension offset” pointing to itself or to a previous extension, the extension’s parser will enter an infinite loop consuming 100% of the CPU.
A remote unauthenticated attacker may be able to create a denial-of-service condition.
Upgrade or apply a patch from the vendor
Patches and updated versions of the software have been released to address this issue. Please see the Vendor Information section of this document for more information.
Users who compile their OpenSLP software from the svn distribution should checkout to the latest svn revision. According to the revision update this vulnerability has been resolved in revision 1647.
393783
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: August 11, 2010 Updated: January 14, 2011
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: October 07, 2010 Updated: March 21, 2011
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Updated: April 21, 2011
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: August 12, 2010 Updated: March 16, 2011
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
Thanks to Nicolas Gregoire of Agarri for reporting this vulnerability.
This document was written by Michael Orlando.
CVE IDs: | CVE-2010-3609 |
---|---|
Severity Metric: | 0.58 Date Public: |