First published: Thu Apr 21 2016(Updated: )
A null pointer dereference vulnerability was found in function _xrealloc() in xlsp_xmalloc.c in OpenSLP. A remote attacker could potentially crash the server when large number of packets are sent. Vulnerable code: void * _xrealloc(const char * file, int line, void * ptr, size_t size) { xallocation_t * x; if (!ptr) return _xmalloc(file, line, size); if (!size) { _xfree(file, line, ptr); return 0; } x = _xmalloc_find(ptr); if (x != 0) { void * newptr = ptr; if (x->size != size) { newptr = _xmalloc(file, line, size); //*** return 0 if failed from _xmalloc memcpy(newptr, ptr, x->size); //*** it'll cased a null pointer reference _xfree(file, line, x); } return newptr; } if (G_xmalloc_fh) fprintf(G_xmalloc_fh, "*** xrealloc called on " "non-xmalloc'd memory ***\n"); return 0; }
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS OpenSLP Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability REDHAT-BUG-1329295 is considered critical due to the potential for remote attackers to crash the server.
To fix REDHAT-BUG-1329295, update OpenSLP to the latest version where this vulnerability has been patched.
Systems running the OpenSLP software are affected by REDHAT-BUG-1329295.
REDHAT-BUG-1329295 can allow a remote attacker to send a large number of packets, potentially leading to a server crash.
Currently, there is no effective workaround for REDHAT-BUG-1329295 other than applying the recommended software updates.