OpenSLP 1.2.1

CPE Details

OpenSLP 1.2.1
1.2.1
2020-01-29
15h12 +00:00
2020-01-29
15h12 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:openslp:openslp:1.2.1:*:*:*:*:*:*:*

Informations

Vendor

openslp

Product

openslp

Version

1.2.1

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2019-5544 2019-12-06 15h54 +00:00 OpenSLP as used in ESXi and the Horizon DaaS appliances has a heap overwrite issue. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8.
9.8
Critique
CVE-2012-4428 2019-12-02 16h41 +00:00 openslp: SLPIntersectStringList()' Function has a DoS vulnerability
7.5
Haute
CVE-2015-5177 2017-10-20 19h00 +00:00 Double free vulnerability in the SLPDKnownDAAdd function in slpd/slpd_knownda.c in OpenSLP 1.2.1 allows remote attackers to cause a denial of service (crash) via a crafted package.
7.5
Haute
CVE-2010-3609 2011-03-11 16h00 +00:00 The extension parser in slp_v2message.c in OpenSLP 1.2.1, and other versions before SVN revision 1647, as used in Service Location Protocol daemon (SLPD) in VMware ESX 4.0 and 4.1 and ESXi 4.0 and 4.1, allows remote attackers to cause a denial of service (infinite loop) via a packet with a "next extension offset" that references this extension or a previous extension. NOTE: some of these details are obtained from third party information.
5
CVE-2005-0769 2005-03-18 04h00 +00:00 Multiple buffer overflows in OpenSLP before 1.1.5 allow remote attackers to have an unknown impact via malformed SLP packets.
7.5