Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-29552
HistoryApr 24, 2023 - 12:00 a.m.

CVE-2023-29552

2023-04-2400:00:00
ubuntu.com
ubuntu.com
22
service location protocol
rfc 2608
unauthenticated
remote attacker
arbitrary services
denial of service
spoofed udp traffic
public internet
dynamic configuration mechanism
enterprise networks

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.023 Low

EPSS

Percentile

89.7%

The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated,
remote attacker to register arbitrary services. This could allow the
attacker to use spoofed UDP traffic to conduct a denial-of-service attack
with a significant amplification factor.

Notes

Author Note
sbeattie The SLP protocol was never meant to be made available to the public Internet, as the RFC 2165 authors recognize: “Service Location provides a dynamic configuration mechanism for applications in local area networks. It is not a global resolution system for the entire Internet; rather it is intended to serve enterprise networks with shared services.”
OSVersionArchitecturePackageVersionFilename
ubuntu14.04noarchopenslp-dfsg< anyUNKNOWN
ubuntu16.04noarchopenslp-dfsg< anyUNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.023 Low

EPSS

Percentile

89.7%