First published: Mon Jan 23 2017(Updated: )
Buffer overflow in the SLPFoldWhiteSpace function in common/slp_compare.c in OpenSLP 2.0 allows remote attackers to have unspecified impact via a crafted string.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS OpenSLP Server | =2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7567 is classified as a high severity vulnerability due to its potential for remote exploitation.
To mitigate CVE-2016-7567, users should upgrade to the latest version of OpenSLP that addresses this buffer overflow issue.
CVE-2016-7567 affects users of OpenSLP version 2.0.0, allowing remote attackers to exploit the vulnerability.
The impact of CVE-2016-7567 can lead to undefined behavior and possible remote code execution due to the buffer overflow.
As of now, there are no confirmed reports of active exploitation of CVE-2016-7567, but it poses a serious security risk.