Bug 684294 (CVE-2010-3609) - CVE-2010-3609 openslp: denial of service vulnerability
Summary: CVE-2010-3609 openslp: denial of service vulnerability
Keywords:
Status: CLOSED UPSTREAM
Alias: CVE-2010-3609
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
: CVE-2015-5155 1263771 (view as bug list)
Depends On: 721102 721103
Blocks: 1263771
TreeView+ depends on / blocked
 
Reported: 2011-03-11 17:52 UTC by Vincent Danen
Modified: 2019-09-29 12:43 UTC (History)
2 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2019-06-10 10:57:43 UTC
Embargoed:


Attachments (Terms of Use)

Description Vincent Danen 2011-03-11 17:52:05 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2010-3609 to
the following vulnerability:

Name: CVE-2010-3609
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3609
Assigned: 20100927
Reference: http://www.securityfocus.com/archive/1/archive/1/516909/100/0/threaded
Reference: http://lists.vmware.com/pipermail/security-announce/2011/000126.html
Reference: http://www.vmware.com/security/advisories/VMSA-2011-0004.html
Reference: http://www.securityfocus.com/bid/46772
Reference: http://www.osvdb.org/71019
Reference: http://securitytracker.com/id?1025168
Reference: http://secunia.com/advisories/43601
Reference: http://www.vupen.com/english/advisories/2011/0606
Reference: http://xforce.iss.net/xforce/xfdb/65931

Unspecified vulnerability in the Service Location Protocol daemon
(SLPD) in VMware ESX 4.0 and 4.1 and ESXi 4.0 and 4.1, and OpenSLP,
allows remote attackers to cause a denial of service (CPU consumption)
via unknown vectors.  NOTE: some of these details are obtained from
third party information.


There are no further details of this, and nothing on openslp.org regarding it, but we do ship OpenSLP in Fedora/EPEL and they are most likely affected.

Comment 1 Jan Lieskovsky 2011-04-21 08:38:52 UTC
Upstream patch:
http://openslp.svn.sourceforge.net/viewvc/openslp?view=revision&revision=1647

Comment 2 Jan Lieskovsky 2011-04-21 09:30:47 UTC
The versions of openslp package, as shipped with Fedora release
of 13 and 14 (openslp-1.2.1-14.fc12.*) are not directly affected
by this issue. Directly in the sense, the proposed upstream patch
from above comment would not be easily applicable.

But if I got the openslp v1.2.1 vs v2.0.beta1 right:
1), in v2.0.beta1 slp_v1message.c contains code for
    dealing with SLPv1 wire protocol messages and slv_v2message.c
    contains code for dealing with SLPv2 wire protocol messages.
    Finally slp_message.c contains code for functions common
    to both versions of SLP wire protocol messages,
2), in v1.2.1 the situation is slightly different. The
    slp_v1message.c still contains function for dealing with
    SLPv1 wire protocol messages. But slp_message.c in v1.2.1
    contains more code.

As a result and to make this long story short, in slp_message.c
in openslp v1.2.1 as shipped with Fedora 13, 14, and in openslp
version as present within EPEL-5 repository, the slp_message.c
contains the following function:

openslp-1.2.1/common/slp_message.c:
867 /*--------------------------------------------------------------------------*/
868 int ParseExtension(SLPBuffer buffer, SLPMessage message)
869 /* Parse extensions *after* all standard protocol fields are parsed
    */
870 /*--------------------------------------------------------------------------*/

The code of this function seems to be noticeably similar to code,
present in slp_v2message.c:

850 static int v2ParseExtension(SLPBuffer buffer, SLPMessage * msg)

from upstream openslp v2.0.beta1, where this flaw was fixed.

Conclusion:
===========
Rex, I think the openslp package versions, as shipped with Fedora release
of 13 and 14, and as present within EPEL-5 repository is affected by this
flaw too (just the particular code doesn't live in slp_v2message.c as in
upstream v2.0.beta1 openslp version, but rather in slp_message.c and
particular affected routine is called:

 868 int ParseExtension(SLPBuffer buffer, SLPMessage message)

in Fedora's / EPEL's openslp v1.2.1 upstream based versions).

So under my opinion, the proposed upstream patch from above comment
should be backported to address this issue in these versions too.

Rex, could you have a look and confirm the above speculation?
(and if shown to be appropriate, backport the patch and schedule
Fedora / EPEL openslp package updates?)

Thank you, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team

Comment 3 Jan Lieskovsky 2011-07-13 18:02:22 UTC
A slightly modified CVE-2010-3609 patch as used by OpenSuSE:
[1] https://build.opensuse.org/package/view_file?file=openslp.parseext.diff&package=openslp&project=openSUSE%3A11.4&srcmd5=38039c725b8a6c1e0cdd4efdffa8bcc8

And openslp-dfsg-1.2.1-7.8 patch applied by Debian Linux distribution
(same as [1]):
[2] http://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg889688.html

Comment 4 Jan Lieskovsky 2011-07-13 18:04:04 UTC
This issue affects the versions of the openslp package, as shipped with Fedora release of 14 and 15. Please schedule an update.

--

This issue affects the version of the openslp package, as present within EPEL-5 repository. Please schedule an update.

Comment 5 Jan Lieskovsky 2011-07-13 18:05:24 UTC
Created openslp tracking bugs for this issue

Affects: fedora-all [bug 721102]
Affects: epel-5 [bug 721103]

Comment 6 Fedora Update System 2015-05-26 21:29:52 UTC
openslp-1.2.1-22.el5 has been pushed to the Fedora EPEL 5 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 7 Fedora Update System 2015-05-27 16:29:06 UTC
openslp-1.2.1-22.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 8 Stefan Cornelius 2015-09-23 10:27:07 UTC
*** Bug 1263769 has been marked as a duplicate of this bug. ***

Comment 9 Stefan Cornelius 2015-09-23 10:28:30 UTC
*** Bug 1263771 has been marked as a duplicate of this bug. ***

Comment 10 Product Security DevOps Team 2019-06-10 10:57:43 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.


Note You need to log in before you can comment on or make changes to this bug.