Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2016-7567 — Improper Restriction of Operations within the Bounds of a Memory Buffer in Openslp
Severity
9.8CRITICALNVD
EPSS
10.8%
top 6.61%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJan 23
Latest updateMay 13
Description
Buffer overflow in the SLPFoldWhiteSpace function in common/slp_compare.c in OpenSLP 2.0 allows remote attackers to have unspecified impact via a crafted string.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages7 packages
Patches
🔴Vulnerability Details
1GHSA▶
GHSA-q4qm-j969-4v59: Buffer overflow in the SLPFoldWhiteSpace function in common/slp_compare↗2022-05-13
💥Exploits & PoCs
1📋Vendor Advisories
2💬Community
3Bugzilla▶
CVE-2016-7567 openslp: memory corruption due to possible overflow in SLPFoldWhiteSpace in common/slp_compare.c↗2016-09-28
Bugzilla▶
CVE-2016-7567 openslp: memory corruption due to possible overflow in SLPFoldWhiteSpace in common/slp_compare.c [epel-5]↗2016-09-28
Bugzilla▶
CVE-2016-7567 openslp: memory corruption due to possible overflow in SLPFoldWhiteSpace in common/slp_compare.c [fedora-all]↗2016-09-28