// For flags

CVE-2010-3609

OpenSLP 1.2.1 / < 1647 trunk - Denial of Service

Severity Score

5.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The extension parser in slp_v2message.c in OpenSLP 1.2.1, and other versions before SVN revision 1647, as used in Service Location Protocol daemon (SLPD) in VMware ESX 4.0 and 4.1 and ESXi 4.0 and 4.1, allows remote attackers to cause a denial of service (infinite loop) via a packet with a "next extension offset" that references this extension or a previous extension. NOTE: some of these details are obtained from third party information.

El analizador de extensiones en el archivo slp_v2message.c en OpenSLP versión 1.2.1 y otras versiones anteriores a la revisión SVN 1647, como es usado en demonio de Service Location Protocol (SLPD) en ESX versiones 4.0 y 4.1 y ESXi versiones 4.0 y 4.1 de VMware, permite a los atacantes remotos causar una denegación de servicio (bucle infinito) por medio de un paquete con un "next extension offset" que hace referencia a esta extensión o una extensión previa. NOTA: algunos de estos detalles son obtenidos a partir de información de terceros.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2010-09-27 CVE Reserved
  • 2011-03-08 CVE Published
  • 2011-08-05 First Exploit
  • 2023-03-07 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Openslp
Search vendor "Openslp"
Openslp
Search vendor "Openslp" for product "Openslp"
1.2.1
Search vendor "Openslp" for product "Openslp" and version "1.2.1"
-
Affected
Vmware
Search vendor "Vmware"
Esx
Search vendor "Vmware" for product "Esx"
4.0
Search vendor "Vmware" for product "Esx" and version "4.0"
-
Affected
Vmware
Search vendor "Vmware"
Esx
Search vendor "Vmware" for product "Esx"
4.1
Search vendor "Vmware" for product "Esx" and version "4.1"
-
Affected
Vmware
Search vendor "Vmware"
Esxi
Search vendor "Vmware" for product "Esxi"
4.0
Search vendor "Vmware" for product "Esxi" and version "4.0"
-
Affected
Vmware
Search vendor "Vmware"
Esxi
Search vendor "Vmware" for product "Esxi"
4.1
Search vendor "Vmware" for product "Esxi" and version "4.1"
-
Affected