7.5
CVSSv3

CVE-2023-29552

Published: 25/04/2023 Updated: 04/05/2023
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote malicious user to register arbitrary services. This could allow the malicious user to use spoofed UDP traffic to conduct a denial-of-service attack with a significant amplification factor.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

netapp smi-s provider -

suse linux enterprise server 11

suse linux enterprise server 12

suse linux enterprise server 15

suse manager server -

vmware esxi

service location protocol project service location protocol -

Vendor Advisories

Description<!---->A flaw was found in OpenSLP Service Location Protocol (SLP) is vulnerable to a reflective denial of service amplification attack via UDP SLP allows an unauthenticated attacker to register new services without limits set by the SLP implementation By using UDP and spoofing the source address, an attacker can request the service l ...