Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2010-3609

Published: 11 March 2011

The extension parser in slp_v2message.c in OpenSLP 1.2.1, and other versions before SVN revision 1647, as used in Service Location Protocol daemon (SLPD) in VMware ESX 4.0 and 4.1 and ESXi 4.0 and 4.1, allows remote attackers to cause a denial of service (infinite loop) via a packet with a "next extension offset" that references this extension or a previous extension. NOTE: some of these details are obtained from third party information.

Priority

Medium

Status

Package Release Status
openslp
Launchpad, Ubuntu, Debian
dapper
Released (1.2.1-5ubuntu0.2)
hardy Does not exist

karmic Does not exist

lucid Does not exist

maverick Does not exist

upstream Needs triage

openslp-dfsg
Launchpad, Ubuntu, Debian
dapper Does not exist

hardy
Released (1.2.1-7.1ubuntu0.2)
karmic
Released (1.2.1-7.5ubuntu0.1)
lucid
Released (1.2.1-7.6ubuntu0.1)
maverick
Released (1.2.1-7.7ubuntu0.1)
upstream Needs triage

Patches:
opensuse: https://build.opensuse.org/package/view_file?file=openslp.parseext.diff&package=openslp&project=openSUSE%3A11.4&srcmd5=38039c725b8a6c1e0cdd4efdffa8bcc8
upstream: http://openslp.svn.sourceforge.net/viewvc/openslp?view=revision&revision=1647