OpenSLP 1.2.1

CPE Details

OpenSLP 1.2.1
1.2.1
2020-01-29
15h12 +00:00
2020-01-29
15h12 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:openslp:openslp:1.2.1:*:*:*:*:*:*:*

Informations

Vendor

openslp

Product

openslp

Version

1.2.1

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2019-5544 2019-12-06 15h54 +00:00 OpenSLP as used in ESXi and the Horizon DaaS appliances has a heap overwrite issue. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8.
9.8
Critical
CVE-2012-4428 2019-12-02 16h41 +00:00 openslp: SLPIntersectStringList()' Function has a DoS vulnerability
7.5
High
CVE-2015-5177 2017-10-20 19h00 +00:00 Double free vulnerability in the SLPDKnownDAAdd function in slpd/slpd_knownda.c in OpenSLP 1.2.1 allows remote attackers to cause a denial of service (crash) via a crafted package.
7.5
High
CVE-2010-3609 2011-03-11 16h00 +00:00 The extension parser in slp_v2message.c in OpenSLP 1.2.1, and other versions before SVN revision 1647, as used in Service Location Protocol daemon (SLPD) in VMware ESX 4.0 and 4.1 and ESXi 4.0 and 4.1, allows remote attackers to cause a denial of service (infinite loop) via a packet with a "next extension offset" that references this extension or a previous extension. NOTE: some of these details are obtained from third party information.
5
CVE-2005-0769 2005-03-18 04h00 +00:00 Multiple buffer overflows in OpenSLP before 1.1.5 allow remote attackers to have an unknown impact via malformed SLP packets.
7.5