5 results (0.012 seconds)

CVSS: 9.8EPSS: 2%CPEs: 260EXPL: 0

OpenSLP as used in ESXi and the Horizon DaaS appliances has a heap overwrite issue. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8. OpenSLP, como es usado en ESXi y los dispositivos Horizon DaaS, presenta un problema de sobrescritura de la pila. VMware ha evaluado la gravedad de este problema para estar en el rango de gravedad Crítica con una puntuación base máxima CVSSv3 de 9.8. A heap overflow vulnerability was found in OpenSLP. • http://www.openwall.com/lists/oss-security/2019/12/10/2 http://www.openwall.com/lists/oss-security/2019/12/11/2 http://www.vmware.com/security/advisories/VMSA-2019-0022.html https://access.redhat.com/errata/RHSA-2019:4240 https://access.redhat.com/errata/RHSA-2020:0199 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DA3LYAJ2NRKMOZLZOQNDJ5TNQRFMWGHF https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZPXXJZLPLAQU • CWE-122: Heap-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 1

Double free vulnerability in the SLPDKnownDAAdd function in slpd/slpd_knownda.c in OpenSLP 1.2.1 allows remote attackers to cause a denial of service (crash) via a crafted package. Vulnerabilidad de liberación doble (double free) en la función SLPDKnownDAAdd en slpd/slpd_knownda.c en OpenSLP 1.2.1 permite que atacantes remotos provoquen una denegación de servicio utilizando un paquete manipulado. • http://sourceforge.net/p/openslp/mercurial/ci/2bc15d0494f886d9c4fe342d23bc160605aea51d http://www.securityfocus.com/bid/76635 http://www.securitytracker.com/id/1033719 https://bugzilla.redhat.com/show_bug.cgi?id=1251064 https://www.debian.org/security/2015/dsa-3353 • CWE-415: Double Free •

CVSS: 7.5EPSS: 2%CPEs: 5EXPL: 0

openslp: SLPIntersectStringList()' Function has a DoS vulnerability openslp: La función SLPIntersectStringList()' presenta una vulnerabilidad de DoS • http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159059.html http://www.openwall.com/lists/oss-security/2012/09/13/27 http://www.securityfocus.com/bid/55540 http://www.ubuntu.com/usn/USN-2730-1 https://access.redhat.com/security/cve/cve-2012-4428 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-4428 https://bugzilla.suse.com/show_bug.cgi?id=CVE-2012-4428 https://exchange.xforce.ibmcloud.com/vulnerabilities/78732 https://security-tracker.debian.org • CWE-125: Out-of-bounds Read •

CVSS: 5.0EPSS: 37%CPEs: 5EXPL: 1

The extension parser in slp_v2message.c in OpenSLP 1.2.1, and other versions before SVN revision 1647, as used in Service Location Protocol daemon (SLPD) in VMware ESX 4.0 and 4.1 and ESXi 4.0 and 4.1, allows remote attackers to cause a denial of service (infinite loop) via a packet with a "next extension offset" that references this extension or a previous extension. NOTE: some of these details are obtained from third party information. El analizador de extensiones en el archivo slp_v2message.c en OpenSLP versión 1.2.1 y otras versiones anteriores a la revisión SVN 1647, como es usado en demonio de Service Location Protocol (SLPD) en ESX versiones 4.0 y 4.1 y ESXi versiones 4.0 y 4.1 de VMware, permite a los atacantes remotos causar una denegación de servicio (bucle infinito) por medio de un paquete con un "next extension offset" que hace referencia a esta extensión o una extensión previa. NOTA: algunos de estos detalles son obtenidos a partir de información de terceros. • https://www.exploit-db.com/exploits/17610 http://lists.vmware.com/pipermail/security-announce/2011/000126.html http://secunia.com/advisories/43601 http://secunia.com/advisories/43742 http://securityreason.com/securityalert/8127 http://securitytracker.com/id?1025168 http://www.kb.cert.org/vuls/id/393783 http://www.mandriva.com/security/advisories?name=MDVSA-2012:141 http://www.mandriva.com/security/advisories?name=MDVSA-2013:111 http://www.osvdb.org/71019 http://www.securityfoc •

CVSS: 7.5EPSS: 1%CPEs: 15EXPL: 0

Multiple buffer overflows in OpenSLP before 1.1.5 allow remote attackers to have an unknown impact via malformed SLP packets. • http://secunia.com/advisories/14561 http://secunia.com/advisories/22128 http://www.gentoo.org/security/en/glsa/glsa-200503-25.xml http://www.mandriva.com/security/advisories?name=MDKSA-2005:055 http://www.novell.com/linux/security/advisories/2005_15_openslp.html http://www.securityfocus.com/archive/1/447537/100/0/threaded http://www.securityfocus.com/bid/12792 http://www.vupen.com/english/advisories/2006/3879 https://exchange.xforce.ibmcloud.com/vulnerabilities/19683 https:/&# •