First published: Thu Aug 06 2015(Updated: )
A double free flaw was found in openslp's SLPDProcessMessage() function. A crafted package could cause openslp to crash. This flaw only affects version 1.2.1 of openslp, which is only shipped in EPEL 5. Version 2.0.0 is not affected. OpenSLP is not actively maintained upstream so patches are not available. Acknowledgements: Red Hat would like to thank Qinghao Tang of QIHU 360 for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openslp-dfsg | ||
debian/1.2.1-10 | <=undefined | |
debian/openslp-dfsg | <=1.2.1-7 | 1.2.1-7.8+deb6u1 1.2.1-9+deb7u1 1.2.1-10+deb8u1 1.2.1-11 |
CentOS OpenSLP Server | =1.2.1 | |
Debian | =7.0 | |
Debian | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5177 is classified as a high severity vulnerability due to its potential to crash the openslp service.
CVE-2015-5177 specifically affects OpenSLP version 1.2.1, which is shipped only in EPEL 5.
To mitigate CVE-2015-5177, upgrade your OpenSLP installation to version 2.0.0 or higher, as it is not affected by this vulnerability.
For detailed information regarding CVE-2015-5177, refer to security advisories and resources provided by your operating system's maintainers.
CVE-2015-5177 is not exploitable in systems using OpenSLP version 2.0.0 or later, as these versions are unaffected.