Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2005:015: openslp


Vulnerability Assessment Details

SUSE-SA:2005:015: openslp

Vulnerability Assessment Summary
Check for the version of the openslp package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory SUSE-SA:2005:015 (openslp).


The SUSE Security Team reviewed critical parts of the OpenSLP package,
an open source implementation of the Service Location Protocol (SLP).
SLP is used by Desktops to locate certain services such as printers and
by servers to announce their services.
During the audit, various buffer overflows and out of bounds memory access
have been fixed which can be triggered by remote attackers by sending
malformed SLP packets.


Solution : http://www.suse.de/security/advisories/2005_15_openslp.html
Network Security Threat Level: Medium

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

HP PROLIANT MICROSERVER G8 E3-1220LV2 2.3GHZ 16GB 1TB MIDLINE
$899.0
HP PROLIANT MICROSERVER G8 E3-1220LV2 2.3GHZ 16GB 1TB MIDLINE pictureLOT of 5 NEW Super Micro Server XEON HEATSINK RETENTION - SKT-095-604E
$19.99
LOT of 5 NEW Super Micro Server XEON HEATSINK RETENTION - SKT-095-604E pictureHP ProLiant ML30 G9 4U Micro Tower Server
$705.95
HP ProLiant ML30 G9 4U Micro Tower Server pictureLGA1151 Intel C236 DDR4 SATA3 & USB 3.0 V & 2GbE Micro ATX Server Motherboard
$248.08
LGA1151 Intel C236 DDR4 SATA3 & USB 3.0 V & 2GbE Micro ATX Server Motherboard picture


Discussions

No Discussions have been posted on this vulnerability.