Overview
OpenSLP contains a vulnerability in the handling of packets containing malformed extensions, which can result in a denial-of-service condition.
Description
Service Location Protocol is an IETF standards track protocol that provides a framework to allow networking applications to discover the existence, location, and configuration of networked services in enterprise networks. The OpenSLP project is an effort to develop an open-source implementation of Service Location Protocol. When OpenSLP parses a SLP packet containing malformed extensions the extensions parser will enter an infinite loop causing a denial-of-service condition. If an attacker creates a packet containing a "next extension offset" pointing to itself or to a previous extension, the extension's parser will enter an infinite loop consuming 100% of the CPU. |
Impact
A remote unauthenticated attacker may be able to create a denial-of-service condition. |
Solution
Upgrade or apply a patch from the vendor |
Vendor Information
CVSS Metrics
| Group | Score | Vector |
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental |
References
Acknowledgements
Thanks to Nicolas Gregoire of Agarri for reporting this vulnerability.
This document was written by Michael Orlando.
Other Information
| CVE IDs: | CVE-2010-3609 |
| Severity Metric: | 0.58 |
| Date Public: | 2011-03-21 |
| Date First Published: | 2011-03-21 |
| Date Last Updated: | 2011-04-21 15:28 UTC |
| Document Revision: | 23 |