search menu icon-carat-right cmu-wordmark

CERT Coordination Center


OpenSLP denial of service vulnerability

Vulnerability Note VU#393783

Original Release Date: 2011-03-21 | Last Revised: 2011-04-21

Overview

OpenSLP contains a vulnerability in the handling of packets containing malformed extensions, which can result in a denial-of-service condition.

Description

Service Location Protocol is an IETF standards track protocol that provides a framework to allow networking applications to discover the existence, location, and configuration of networked services in enterprise networks. The OpenSLP project is an effort to develop an open-source implementation of Service Location Protocol. When OpenSLP parses a SLP packet containing malformed extensions the extensions parser will enter an infinite loop causing a denial-of-service condition.

If an attacker creates a packet containing a "next extension offset" pointing to itself or to a previous extension, the extension's parser will enter an infinite loop consuming 100% of the CPU.

Impact

A remote unauthenticated attacker may be able to create a denial-of-service condition.

Solution

Upgrade or apply a patch from the vendor

Patches and updated versions of the software have been released to address this issue. Please see the Vendor Information section of this document for more information.

Users who compile their OpenSLP software from the svn distribution should checkout to the latest svn revision. According to the revision update this vulnerability has been resolved in revision 1647.

Vendor Information

393783
Expand all

Novell, Inc.

Notified:  August 11, 2010 Updated:  January 14, 2011

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

http://support.novell.com/security/cve/CVE-2010-3609.html

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

SUSE Linux

Notified:  October 07, 2010 Updated:  March 21, 2011

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

http://support.novell.com/security/cve/CVE-2010-3609.html

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Ubuntu

Updated:  April 21, 2011

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

https://launchpad.net/ubuntu/+source/openslp-dfsg/1.2.1-7.7ubuntu0.1 https://launchpad.net/ubuntu/+source/openslp-dfsg/1.2.1-7.6ubuntu0.1 https://launchpad.net/ubuntu/+source/openslp-dfsg/1.2.1-7.5ubuntu0.1 https://launchpad.net/ubuntu/+source/openslp-dfsg/1.2.1-7.1ubuntu0.2 https://launchpad.net/ubuntu/+source/openslp/1.2.1-5ubuntu0.2

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

VMware

Notified:  August 12, 2010 Updated:  March 16, 2011

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

http://www.vmware.com/security/advisories/VMSA-2011-0004.html

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Credit

Thanks to Nicolas Gregoire of Agarri for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

CVE IDs: CVE-2010-3609
Severity Metric: 0.58
Date Public: 2011-03-21
Date First Published: 2011-03-21
Date Last Updated: 2011-04-21 15:28 UTC
Document Revision: 22

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.