5
CVSSv2

CVE-2010-3609

Published: 11/03/2011 Updated: 10/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The extension parser in slp_v2message.c in OpenSLP 1.2.1, and other versions before SVN revision 1647, as used in Service Location Protocol daemon (SLPD) in VMware ESX 4.0 and 4.1 and ESXi 4.0 and 4.1, allows remote malicious users to cause a denial of service (infinite loop) via a packet with a "next extension offset" that references this extension or a previous extension. NOTE: some of these details are obtained from third party information.

Vulnerable Product Search on Vulmon Subscribe to Product

vmware esxi 4.0

openslp openslp 1.2.1

vmware esx 4.0

vmware esx 4.1

vmware esxi 4.1

Vendor Advisories

Debian Bug report logs - #623551 CVE-2010-3609 Package: openslp-dfsg; Maintainer for openslp-dfsg is Debian QA Group <packages@qadebianorg>; Reported by: Moritz Muehlenhoff <muehlenhoff@univentionde> Date: Thu, 21 Apr 2011 06:15:08 UTC Severity: grave Tags: security Fixed in version openslp-dfsg/121-8 Done: Mo ...
An attacker could send crafted input to OpenSLP and cause it to hang ...

Exploits

#!/usr/bin/python # Title: OpenSLP DoS # Author: Nicolas Gregoire (@Agarri_FR) # CVE: 2010-3609 # Software download: wwwopenslporg/downloadhtml # Version: v121 and trunk before revision 1647 # Tested on: Linux Ubuntu 1004, VMware ESX 40 # Notes: It affects some others SLP softwares, like mSLP More details (in French) on my blog =&g ...