ALT-PU-2018-2713-1
Closed vulnerabilities
Modified: 2021-03-23
BDU:2015-09474
Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2025-04-03
CVE-2005-0769
Multiple buffer overflows in OpenSLP before 1.1.5 allow remote attackers to have an unknown impact via malformed SLP packets.
- http://secunia.com/advisories/14561
- http://secunia.com/advisories/22128
- http://www.gentoo.org/security/en/glsa/glsa-200503-25.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:055
- http://www.novell.com/linux/security/advisories/2005_15_openslp.html
- http://www.securityfocus.com/archive/1/447537/100/0/threaded
- http://www.securityfocus.com/bid/12792
- http://www.vupen.com/english/advisories/2006/3879
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19683
- https://usn.ubuntu.com/98-1/
- http://secunia.com/advisories/14561
- http://secunia.com/advisories/22128
- http://www.gentoo.org/security/en/glsa/glsa-200503-25.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:055
- http://www.novell.com/linux/security/advisories/2005_15_openslp.html
- http://www.securityfocus.com/archive/1/447537/100/0/threaded
- http://www.securityfocus.com/bid/12792
- http://www.vupen.com/english/advisories/2006/3879
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19683
- https://usn.ubuntu.com/98-1/
Modified: 2025-04-11
CVE-2010-3609
The extension parser in slp_v2message.c in OpenSLP 1.2.1, and other versions before SVN revision 1647, as used in Service Location Protocol daemon (SLPD) in VMware ESX 4.0 and 4.1 and ESXi 4.0 and 4.1, allows remote attackers to cause a denial of service (infinite loop) via a packet with a "next extension offset" that references this extension or a previous extension. NOTE: some of these details are obtained from third party information.
- http://lists.vmware.com/pipermail/security-announce/2011/000126.html
- http://secunia.com/advisories/43601
- http://secunia.com/advisories/43742
- http://securityreason.com/securityalert/8127
- http://securitytracker.com/id?1025168
- http://www.kb.cert.org/vuls/id/393783
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:141
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:111
- http://www.osvdb.org/71019
- http://www.securityfocus.com/archive/1/516909/100/0/threaded
- http://www.securityfocus.com/bid/46772
- http://www.vmware.com/security/advisories/VMSA-2011-0004.html
- http://www.vupen.com/english/advisories/2011/0606
- http://www.vupen.com/english/advisories/2011/0729
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65931
- https://security.gentoo.org/glsa/201707-05
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0227
- http://lists.vmware.com/pipermail/security-announce/2011/000126.html
- http://secunia.com/advisories/43601
- http://secunia.com/advisories/43742
- http://securityreason.com/securityalert/8127
- http://securitytracker.com/id?1025168
- http://www.kb.cert.org/vuls/id/393783
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:141
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:111
- http://www.osvdb.org/71019
- http://www.securityfocus.com/archive/1/516909/100/0/threaded
- http://www.securityfocus.com/bid/46772
- http://www.vmware.com/security/advisories/VMSA-2011-0004.html
- http://www.vupen.com/english/advisories/2011/0606
- http://www.vupen.com/english/advisories/2011/0729
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65931
- https://security.gentoo.org/glsa/201707-05
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0227
Modified: 2024-11-21
CVE-2012-4428
openslp: SLPIntersectStringList()' Function has a DoS vulnerability
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159059.html
- http://www.openwall.com/lists/oss-security/2012/09/13/27
- http://www.securityfocus.com/bid/55540
- http://www.ubuntu.com/usn/USN-2730-1
- https://access.redhat.com/security/cve/cve-2012-4428
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-4428
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2012-4428
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78732
- https://security-tracker.debian.org/tracker/CVE-2012-4428
- https://security.gentoo.org/glsa/201707-05
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159059.html
- http://www.openwall.com/lists/oss-security/2012/09/13/27
- http://www.securityfocus.com/bid/55540
- http://www.ubuntu.com/usn/USN-2730-1
- https://access.redhat.com/security/cve/cve-2012-4428
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-4428
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2012-4428
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78732
- https://security-tracker.debian.org/tracker/CVE-2012-4428
- https://security.gentoo.org/glsa/201707-05
Modified: 2025-04-20
CVE-2015-5177
Double free vulnerability in the SLPDKnownDAAdd function in slpd/slpd_knownda.c in OpenSLP 1.2.1 allows remote attackers to cause a denial of service (crash) via a crafted package.
- http://sourceforge.net/p/openslp/mercurial/ci/2bc15d0494f886d9c4fe342d23bc160605aea51d/
- http://www.securityfocus.com/bid/76635
- http://www.securitytracker.com/id/1033719
- https://bugzilla.redhat.com/show_bug.cgi?id=1251064
- https://www.debian.org/security/2015/dsa-3353
- http://sourceforge.net/p/openslp/mercurial/ci/2bc15d0494f886d9c4fe342d23bc160605aea51d/
- http://www.securityfocus.com/bid/76635
- http://www.securitytracker.com/id/1033719
- https://bugzilla.redhat.com/show_bug.cgi?id=1251064
- https://www.debian.org/security/2015/dsa-3353