Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2016-7567Improper Restriction of Operations within the Bounds of a Memory Buffer in Openslp

Severity
9.8CRITICALNVD
EPSS
10.8%
top 6.61%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJan 23
Latest updateMay 13

Description

Buffer overflow in the SLPFoldWhiteSpace function in common/slp_compare.c in OpenSLP 2.0 allows remote attackers to have unspecified impact via a crafted string.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Patches

🔴Vulnerability Details

1
GHSA
GHSA-q4qm-j969-4v59: Buffer overflow in the SLPFoldWhiteSpace function in common/slp_compare2022-05-13

💥Exploits & PoCs

1
Exploit-DB
OpenSLP 2.0.0 - Multiple Vulnerabilities2018-11-07

📋Vendor Advisories

2
Microsoft
Buffer overflow in the SLPFoldWhiteSpace function in common/slp_compare.c in OpenSLP 2.0 allows remote attackers to have unspecified impact via a crafted string.2017-01-10
Red Hat
openslp: memory corruption due to possible overflow in SLPFoldWhiteSpace in common/slp_compare.c2016-09-27

💬Community

3
Bugzilla
CVE-2016-7567 openslp: memory corruption due to possible overflow in SLPFoldWhiteSpace in common/slp_compare.c2016-09-28
Bugzilla
CVE-2016-7567 openslp: memory corruption due to possible overflow in SLPFoldWhiteSpace in common/slp_compare.c [epel-5]2016-09-28
Bugzilla
CVE-2016-7567 openslp: memory corruption due to possible overflow in SLPFoldWhiteSpace in common/slp_compare.c [fedora-all]2016-09-28