Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 560694 (CVE-2015-5155) - net-libs/openslp: ParseExtension() DoS vulnerability
Summary: net-libs/openslp: ParseExtension() DoS vulnerability
Status: RESOLVED DUPLICATE of bug 360061
Alias: CVE-2015-5155
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: http://seclists.org/oss-sec/2015/q3/559
Whiteboard: B3 [upstream]
Keywords:
Depends on:
Blocks:
 
Reported: 2015-09-17 09:47 UTC by Agostino Sarubbo
Modified: 2017-01-21 16:46 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2015-09-17 09:47:55 UTC
From ${URL} :

The function ParseExtension() in openslp 1.2.1 exists a vulnerability , an
attacher can cause a denial of service (infinite loop) via a  packet with
crafted "nextoffset" value and "extid" value.



@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Thomas Deutschmann (RETIRED) gentoo-dev 2017-01-21 16:46:47 UTC
This is a dupe of CVE-2010-3609.

*** This bug has been marked as a duplicate of bug 360061 ***