Joined: 27 Jun 2003
Location: Gothenburg, Sweden
|Posted: Sun Mar 20, 2005 9:50 pm Post subject: [ GLSA 200503-25 ] OpenSLP: Multiple buffer overflows
|Gentoo Linux Security Advisory
Title: OpenSLP: Multiple buffer overflows (GLSA 200503-25)
Date: March 20, 2005
Updated: May 22, 2006
Multiple buffer overflows have been found in OpenSLP, which could lead to the remote execution of arbitrary code.
OpenSLP is an open-source implementation of Service Location Protocol (SLP).
Vulnerable: < 1.2.1
Unaffected: >= 1.2.1
Architectures: All supported architectures
Multiple buffer overflows have been found in OpenSLP, when handling malformed SLP packets.
By sending specially crafted SLP packets, a remote attacker could potentially execute arbitrary code with the rights of the OpenSLP daemon.
There is no known workaround at this time.
All OpenSLP users should upgrade to the latest version:
|# emerge --sync
# emerge --ask --oneshot --verbose ">=net-libs/openslp-1.2.1"
SUSE Security Announcement
Last edited by GLSA on Sun Jul 30, 2006 4:17 am; edited 4 times in total