First published: Thu Apr 21 2016(Updated: )
A null pointer dereference vulnerability was found in function _xrealloc() in xlsp_xmalloc.c in OpenSLP. A remote attacker could potentially crash the server when large number of packets are sent. Vulnerable code: void * _xrealloc(const char * file, int line, void * ptr, size_t size) { xallocation_t * x; if (!ptr) return _xmalloc(file, line, size); if (!size) { _xfree(file, line, ptr); return 0; } x = _xmalloc_find(ptr); if (x != 0) { void * newptr = ptr; if (x->size != size) { newptr = _xmalloc(file, line, size); //*** return 0 if failed from _xmalloc memcpy(newptr, ptr, x->size); //*** it'll cased a null pointer reference _xfree(file, line, x); } return newptr; } if (G_xmalloc_fh) fprintf(G_xmalloc_fh, "*** xrealloc called on " "non-xmalloc'd memory ***\n"); return 0; }
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenSLP | =2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4912 has a medium severity rating due to its potential to cause a denial of service.
To fix CVE-2016-4912, you should upgrade to a patched version of OpenSLP that addresses this vulnerability.
CVE-2016-4912 affects OpenSLP version 2.0.0.
Yes, CVE-2016-4912 can be exploited remotely by sending a large number of packets.
An attacker can exploit CVE-2016-4912 to cause a null pointer dereference, potentially crashing the server.