Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2005:015: openslp


Vulnerability Assessment Details

SUSE-SA:2005:015: openslp

Vulnerability Assessment Summary
Check for the version of the openslp package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory SUSE-SA:2005:015 (openslp).


The SUSE Security Team reviewed critical parts of the OpenSLP package,
an open source implementation of the Service Location Protocol (SLP).
SLP is used by Desktops to locate certain services such as printers and
by servers to announce their services.
During the audit, various buffer overflows and out of bounds memory access
have been fixed which can be triggered by remote attackers by sending
malformed SLP packets.


Solution : http://www.suse.de/security/advisories/2005_15_openslp.html
Network Security Threat Level: Medium

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

Genuine IBM 92P1016 AC Adapter 92P1017 for ThinkPad 1400 1500 1700 OEM
$10.0
Genuine IBM 92P1016 AC Adapter 92P1017 for ThinkPad 1400 1500 1700 OEM picture*Lot of 2* IBM OEM 60GB 4200RPM 2.5" Hard Drives Tested/Working
$12.99
*Lot of 2* IBM OEM 60GB 4200RPM 2.5NEW SEALED Genuine OEM IBM PC DOS 6.1 67G7073 3.5" FRENCH/FRANÇAIS
$41.14
NEW SEALED Genuine OEM IBM PC DOS 6.1 67G7073 3.5OEM IBM 08K8208, 08K8209 AC Power Adapter 16V 4.5A IBM Lenovo ThinkPad
$9.99
OEM IBM 08K8208, 08K8209 AC Power Adapter 16V 4.5A IBM Lenovo ThinkPad picture


Discussions

No Discussions have been posted on this vulnerability.