Common Vulnerabilities and Exposures assigned an identifier CVE-2010-3609 to the following vulnerability: Name: CVE-2010-3609 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3609 Assigned: 20100927 Reference: http://www.securityfocus.com/archive/1/archive/1/516909/100/0/threaded Reference: http://lists.vmware.com/pipermail/security-announce/2011/000126.html Reference: http://www.vmware.com/security/advisories/VMSA-2011-0004.html Reference: http://www.securityfocus.com/bid/46772 Reference: http://www.osvdb.org/71019 Reference: http://securitytracker.com/id?1025168 Reference: http://secunia.com/advisories/43601 Reference: http://www.vupen.com/english/advisories/2011/0606 Reference: http://xforce.iss.net/xforce/xfdb/65931 Unspecified vulnerability in the Service Location Protocol daemon (SLPD) in VMware ESX 4.0 and 4.1 and ESXi 4.0 and 4.1, and OpenSLP, allows remote attackers to cause a denial of service (CPU consumption) via unknown vectors. NOTE: some of these details are obtained from third party information. There are no further details of this, and nothing on openslp.org regarding it, but we do ship OpenSLP in Fedora/EPEL and they are most likely affected.
Upstream patch: http://openslp.svn.sourceforge.net/viewvc/openslp?view=revision&revision=1647
The versions of openslp package, as shipped with Fedora release of 13 and 14 (openslp-1.2.1-14.fc12.*) are not directly affected by this issue. Directly in the sense, the proposed upstream patch from above comment would not be easily applicable. But if I got the openslp v1.2.1 vs v2.0.beta1 right: 1), in v2.0.beta1 slp_v1message.c contains code for dealing with SLPv1 wire protocol messages and slv_v2message.c contains code for dealing with SLPv2 wire protocol messages. Finally slp_message.c contains code for functions common to both versions of SLP wire protocol messages, 2), in v1.2.1 the situation is slightly different. The slp_v1message.c still contains function for dealing with SLPv1 wire protocol messages. But slp_message.c in v1.2.1 contains more code. As a result and to make this long story short, in slp_message.c in openslp v1.2.1 as shipped with Fedora 13, 14, and in openslp version as present within EPEL-5 repository, the slp_message.c contains the following function: openslp-1.2.1/common/slp_message.c: 867 /*--------------------------------------------------------------------------*/ 868 int ParseExtension(SLPBuffer buffer, SLPMessage message) 869 /* Parse extensions *after* all standard protocol fields are parsed */ 870 /*--------------------------------------------------------------------------*/ The code of this function seems to be noticeably similar to code, present in slp_v2message.c: 850 static int v2ParseExtension(SLPBuffer buffer, SLPMessage * msg) from upstream openslp v2.0.beta1, where this flaw was fixed. Conclusion: =========== Rex, I think the openslp package versions, as shipped with Fedora release of 13 and 14, and as present within EPEL-5 repository is affected by this flaw too (just the particular code doesn't live in slp_v2message.c as in upstream v2.0.beta1 openslp version, but rather in slp_message.c and particular affected routine is called: 868 int ParseExtension(SLPBuffer buffer, SLPMessage message) in Fedora's / EPEL's openslp v1.2.1 upstream based versions). So under my opinion, the proposed upstream patch from above comment should be backported to address this issue in these versions too. Rex, could you have a look and confirm the above speculation? (and if shown to be appropriate, backport the patch and schedule Fedora / EPEL openslp package updates?) Thank you, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team
A slightly modified CVE-2010-3609 patch as used by OpenSuSE: [1] https://build.opensuse.org/package/view_file?file=openslp.parseext.diff&package=openslp&project=openSUSE%3A11.4&srcmd5=38039c725b8a6c1e0cdd4efdffa8bcc8 And openslp-dfsg-1.2.1-7.8 patch applied by Debian Linux distribution (same as [1]): [2] http://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg889688.html
This issue affects the versions of the openslp package, as shipped with Fedora release of 14 and 15. Please schedule an update. -- This issue affects the version of the openslp package, as present within EPEL-5 repository. Please schedule an update.
Created openslp tracking bugs for this issue Affects: fedora-all [bug 721102] Affects: epel-5 [bug 721103]
openslp-1.2.1-22.el5 has been pushed to the Fedora EPEL 5 stable repository. If problems still persist, please make note of it in this bug report.
openslp-1.2.1-22.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
*** Bug 1263769 has been marked as a duplicate of this bug. ***
*** Bug 1263771 has been marked as a duplicate of this bug. ***
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.