|
|||
Rule General Information |
---|
Release Date: | 2019-12-17 | |
Rule Name: | OpenSLP Project and VMWare OpenSLP Heap Buffer Overflow Vulnerability (CVE-2019-5544) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | A heap buffer overflow vulnerability has been reported in OpenSLP distributed by the OpenSLP Project and VMware ESXi and Horizon DaaS. The vulnerability is due to improperly checking the bounds of a buffer before copying data to it. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted request to OpenSLP service on port 427. Successful exploitation could result in arbitrary code execution in the context of the target server. | |
Impact: | A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks includes arbitrary code execution and denial of service. | |
Affected OS: | Windows, Others | |
Reference: | http://www.openwall.com/lists/oss-security/2019/12/10/2 http://www.openwall.com/lists/oss-security/2019/12/11/2 http://www.vmware.com/security/advisories/VMSA-2019-0022.html https://access.redhat.com/errata/RHSA-2019:4240 |
|
Solutions |
---|
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product. |