First published: Fri Mar 11 2011(Updated: )
The extension parser in slp_v2message.c in OpenSLP 1.2.1, and other versions before SVN revision 1647, as used in Service Location Protocol daemon (SLPD) in VMware ESX 4.0 and 4.1 and ESXi 4.0 and 4.1, allows remote attackers to cause a denial of service (infinite loop) via a packet with a "next extension offset" that references this extension or a previous extension. NOTE: some of these details are obtained from third party information.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS OpenSLP Server | =1.2.1 | |
VMware ESXi | =4.0 | |
VMware ESXi | =4.1 | |
VMware ESXi | =4.0 | |
VMware ESXi | =4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3609 is considered a moderate severity vulnerability due to its potential to cause a denial of service.
To fix CVE-2010-3609, users should upgrade to OpenSLP version 1.2.1 SVN revision 1647 or later, and ensure that VMware ESX and ESXi systems are updated to the latest versions.
CVE-2010-3609 affects OpenSLP versions before SVN revision 1647 and VMware ESX 4.0, 4.1 and ESXi 4.0, 4.1.
CVE-2010-3609 allows remote attackers to execute a denial-of-service attack by sending specially crafted packets.
CVE-2010-3609 is not a threat to current systems if they are updated beyond the vulnerable versions mentioned, but systems on outdated software remain at risk.