GLSA Administrator
![Administrator Administrator](/images/ranks/rank-admin.gif)
![](images/avatars/3896974784c480ee5977f8.gif)
Joined: 27 Jun 2003 Posts: 4983 Location: Gothenburg, Sweden
|
Posted: Sun Mar 20, 2005 9:50 pm Post subject: [ GLSA 200503-25 ] OpenSLP: Multiple buffer overflows |
|
|
Gentoo Linux Security Advisory
Title: OpenSLP: Multiple buffer overflows (GLSA 200503-25)
Severity: high
Exploitable: remote
Date: March 20, 2005
Updated: May 22, 2006
Bug(s): #85347
ID: 200503-25
Synopsis
Multiple buffer overflows have been found in OpenSLP, which could lead to the remote execution of arbitrary code.
Background
OpenSLP is an open-source implementation of Service Location Protocol (SLP).
Affected Packages
Package: net-libs/openslp
Vulnerable: < 1.2.1
Unaffected: >= 1.2.1
Architectures: All supported architectures
Description
Multiple buffer overflows have been found in OpenSLP, when handling malformed SLP packets.
Impact
By sending specially crafted SLP packets, a remote attacker could potentially execute arbitrary code with the rights of the OpenSLP daemon.
Workaround
There is no known workaround at this time.
Resolution
All OpenSLP users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=net-libs/openslp-1.2.1" |
References
SUSE Security Announcement
CVE-2005-0769
Last edited by GLSA on Sun Jul 30, 2006 4:17 am; edited 4 times in total |
|