9 results (0.026 seconds)

CVSS: 9.8EPSS: 87%CPEs: 260EXPL: 2

06 Dec 2019 — OpenSLP as used in ESXi and the Horizon DaaS appliances has a heap overwrite issue. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8. OpenSLP, como es usado en ESXi y los dispositivos Horizon DaaS, presenta un problema de sobrescritura de la pila. VMware ha evaluado la gravedad de este problema para estar en el rango de gravedad Crítica con una puntuación base máxima CVSSv3 de 9.8. A heap overflow vulnerability was found in OpenSLP.... • https://github.com/HynekPetrak/CVE-2019-5544_CVE-2020-3992 • CWE-122: Heap-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 1%CPEs: 67EXPL: 0

23 Apr 2018 — OpenSLP releases in the 1.0.2 and 1.1.0 code streams have a heap-related memory corruption issue which may manifest itself as a denial-of-service or a remote code-execution vulnerability. Las versiones de OpenSLP en las secuencias de código 1.0.2 y 1.1.0 tienen un problema de corrupción de memoria relacionada con la memoria dinámica (heap), que puede manifestarse como una vulnerabilidad de denegación de servicio (DoS) o de ejecución remota de código. A use-after-free flaw in OpenSLP 1.x and 2.x baselines wa... • http://support.lenovo.com/us/en/solutions/LEN-18247 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-416: Use After Free •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

27 Mar 2017 — The _xrealloc function in xlsp_xmalloc.c in OpenSLP 2.0.0 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a large number of crafted packets, which triggers a memory allocation failure. La función _xrealloc en xlsp_xmalloc.c en OpenSLP 2.0.0 permite a atacantes remotos provocar una denegación de servicio (referencia a puntero NULL y caída) a través de un gran número de paquetes manipulados, lo que desencadena un fallo de asignación de memoria. Multiple vulnerabil... • http://www.openwall.com/lists/oss-security/2016/05/18/6 • CWE-476: NULL Pointer Dereference •

CVSS: 9.8EPSS: 25%CPEs: 1EXPL: 2

23 Jan 2017 — Buffer overflow in the SLPFoldWhiteSpace function in common/slp_compare.c in OpenSLP 2.0 allows remote attackers to have unspecified impact via a crafted string. Desbordamiento de búfer en la función SLPFoldWhiteSpace en common/slp_compare.c en OpenSLP 2.0 permite a atacantes remotos tener un impacto no especificado a través de una cadena manipulada. Multiple vulnerabilities have been found in OpenSLP, the worst of which allows remote attackers to cause a Denial of Service condition or other unspecified imp... • https://packetstorm.news/files/id/150240 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 41%CPEs: 5EXPL: 0

03 Sep 2015 — openslp: SLPIntersectStringList()' Function has a DoS vulnerability openslp: La función SLPIntersectStringList()' presenta una vulnerabilidad de DoS Georgi Geshev discovered that OpenSLP incorrectly handled processing certain service requests. A remote attacker could possibly use this issue to cause OpenSLP to crash, resulting in a denial of service. This issue only affected Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. Qinghao Tang discovered that OpenSLP incorrectly handled processing certain messages. A remote ... • http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159059.html • CWE-125: Out-of-bounds Read •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 1

03 Sep 2015 — Double free vulnerability in the SLPDKnownDAAdd function in slpd/slpd_knownda.c in OpenSLP 1.2.1 allows remote attackers to cause a denial of service (crash) via a crafted package. Vulnerabilidad de liberación doble (double free) en la función SLPDKnownDAAdd en slpd/slpd_knownda.c en OpenSLP 1.2.1 permite que atacantes remotos provoquen una denegación de servicio utilizando un paquete manipulado. Georgi Geshev discovered that OpenSLP incorrectly handled processing certain service requests. A remote attacker... • http://sourceforge.net/p/openslp/mercurial/ci/2bc15d0494f886d9c4fe342d23bc160605aea51d • CWE-415: Double Free •

CVSS: 7.5EPSS: 37%CPEs: 5EXPL: 1

11 Mar 2011 — The extension parser in slp_v2message.c in OpenSLP 1.2.1, and other versions before SVN revision 1647, as used in Service Location Protocol daemon (SLPD) in VMware ESX 4.0 and 4.1 and ESXi 4.0 and 4.1, allows remote attackers to cause a denial of service (infinite loop) via a packet with a "next extension offset" that references this extension or a previous extension. NOTE: some of these details are obtained from third party information. El analizador de extensiones en el archivo slp_v2message.c en OpenSLP ... • https://www.exploit-db.com/exploits/17610 •

CVSS: 9.8EPSS: 3%CPEs: 15EXPL: 0

18 Mar 2005 — Multiple buffer overflows in OpenSLP before 1.1.5 allow remote attackers to have an unknown impact via malformed SLP packets. • http://secunia.com/advisories/14561 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

25 Oct 2003 — Symbolic link vulnerability in the slpd script slpd.all_init for OpenSLP before 1.0.11 allows local users to overwrite arbitrary files via the route.check temporary file. Vulnerabilidad de enlaces simbólicos en el script slpd slpd.all_init de OpenSLP anteriores a 1.0.11 permite a usuarios locales sobreescribir ficheros arbitrarios mediante el fichero temporal route.check. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000723 •