Multiple buffer overflows in OpenSLP before 1.1.5 allow remote attackers to have an unknown impact via malformed SLP packets.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Openslp | Openslp | 1.0.1 (including) | 1.0.1 (including) |
Openslp | Openslp | 1.0.2 (including) | 1.0.2 (including) |
Openslp | Openslp | 1.0.3 (including) | 1.0.3 (including) |
Openslp | Openslp | 1.0.4 (including) | 1.0.4 (including) |
Openslp | Openslp | 1.0.5 (including) | 1.0.5 (including) |
Openslp | Openslp | 1.0.6 (including) | 1.0.6 (including) |
Openslp | Openslp | 1.0.7 (including) | 1.0.7 (including) |
Openslp | Openslp | 1.0.8_a (including) | 1.0.8_a (including) |
Openslp | Openslp | 1.0.9_a (including) | 1.0.9_a (including) |
Openslp | Openslp | 1.0.10 (including) | 1.0.10 (including) |
Openslp | Openslp | 1.0.11 (including) | 1.0.11 (including) |
Openslp | Openslp | 1.0_.0 (including) | 1.0_.0 (including) |
Openslp | Openslp | 1.1.5 (including) | 1.1.5 (including) |
Openslp | Openslp | 1.2.1 (including) | 1.2.1 (including) |
Openslp | Openslp | 1.2_.0 (including) | 1.2_.0 (including) |
Openslp | Ubuntu | dapper | * |
Openslp | Ubuntu | devel | * |
Openslp | Ubuntu | edgy | * |
Openslp | Ubuntu | feisty | * |