CVE-2017-17833

critical
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

OpenSLP releases in the 1.0.2 and 1.1.0 code streams have a heap-related memory corruption issue which may manifest itself as a denial-of-service or a remote code-execution vulnerability.

References

http://support.lenovo.com/us/en/solutions/LEN-18247

https://access.redhat.com/errata/RHSA-2018:2240

https://access.redhat.com/errata/RHSA-2018:2308

https://lists.debian.org/debian-lts-announce/2018/04/msg00029.html

https://security.gentoo.org/glsa/202005-12

https://sourceforge.net/p/openslp/mercurial/ci/151f07745901cbdba6e00e4889561b4083250da1/

https://usn.ubuntu.com/3708-1/

Details

Source: MITRE

Published: 2018-04-23

Updated: 2020-05-15

Type: CWE-119

Risk Information

CVSS v2

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 10

Severity: HIGH

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 3.9

Severity: CRITICAL

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:openslp:openslp:1.0.2:*:*:*:*:*:*:*

cpe:2.3:a:openslp:openslp:1.1.0:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

Configuration 4

OR

cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Configuration 5

AND

OR

cpe:2.3:o:lenovo:thinkserver_rd350g_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:lenovo:thinkserver_rd350g:-:*:*:*:*:*:*:*

Configuration 6

AND

OR

cpe:2.3:o:lenovo:thinkserver_rd350x_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:lenovo:thinkserver_rd350x:-:*:*:*:*:*:*:*

Configuration 7

AND

OR

cpe:2.3:o:lenovo:thinkserver_rd450x_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:lenovo:thinkserver_rd450x:-:*:*:*:*:*:*:*

Configuration 8

AND

OR

cpe:2.3:o:lenovo:thinksystem_hr630x_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:lenovo:thinksystem_hr630x:-:*:*:*:*:*:*:*

Configuration 9

AND

OR

cpe:2.3:o:lenovo:thinksystem_hr650x_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:lenovo:thinksystem_hr650x:-:*:*:*:*:*:*:*

Configuration 10

AND

OR

cpe:2.3:o:lenovo:thinksystem_sr630_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:lenovo:thinksystem_sr630:-:*:*:*:*:*:*:*

Configuration 11

AND

OR

cpe:2.3:o:lenovo:flex_system_fc3171_8gb_san_switch_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:lenovo:flex_system_fc3171_8gb_san_switch:-:*:*:*:*:*:*:*

Configuration 12

AND

OR

cpe:2.3:o:lenovo:storage_n3310_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:lenovo:storage_n3310:-:*:*:*:*:*:*:*

Configuration 13

AND

OR

cpe:2.3:o:lenovo:storage_n4610_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:lenovo:storage_n4610:-:*:*:*:*:*:*:*

Configuration 14

OR

cpe:2.3:a:lenovo:bm_nextscale_fan_power_controller:*:*:*:*:*:*:*:*

cpe:2.3:a:lenovo:cmm:*:*:*:*:*:*:*:*

cpe:2.3:a:lenovo:fan_power_controller:*:*:*:*:*:*:*:*

cpe:2.3:a:lenovo:imm1:*:*:*:*:*:*:*:*

cpe:2.3:a:lenovo:imm2:*:*:*:*:*:*:*:*

cpe:2.3:a:lenovo:xclarity_administrator:*:*:*:*:*:*:*:*

Configuration 15

AND

OR

cpe:2.3:o:lenovo:thinkserver_rd340_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:lenovo:thinkserver_rd340:-:*:*:*:*:*:*:*

Configuration 16

AND

OR

cpe:2.3:o:lenovo:thinkserver_rd350_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:lenovo:thinkserver_rd350:-:*:*:*:*:*:*:*

Configuration 17

AND

OR

cpe:2.3:o:lenovo:thinkserver_rd440_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:lenovo:thinkserver_rd440:-:*:*:*:*:*:*:*

Configuration 18

AND

OR

cpe:2.3:o:lenovo:thinkserver_rd450_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:lenovo:thinkserver_rd450:-:*:*:*:*:*:*:*

Configuration 19

AND

OR

cpe:2.3:o:lenovo:thinkserver_rd550_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:lenovo:thinkserver_rd550:-:*:*:*:*:*:*:*

Configuration 20

AND

OR

cpe:2.3:o:lenovo:thinkserver_rd540_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:lenovo:thinkserver_rd540:-:*:*:*:*:*:*:*

Configuration 21

AND

OR

cpe:2.3:o:lenovo:thinkserver_rd640_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:lenovo:thinkserver_rd640:-:*:*:*:*:*:*:*

Configuration 22

AND

OR

cpe:2.3:o:lenovo:thinkserver_rd650_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:lenovo:thinkserver_rd650:-:*:*:*:*:*:*:*

Configuration 23

AND

OR

cpe:2.3:o:lenovo:thinkserver_rq750_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:lenovo:thinkserver_rq750:-:*:*:*:*:*:*:*

Configuration 24

AND

OR

cpe:2.3:o:lenovo:thinkserver_rs160_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:lenovo:thinkserver_rs160:-:*:*:*:*:*:*:*

Configuration 25

AND

OR

cpe:2.3:o:lenovo:thinkserver_sd350_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:lenovo:thinkserver_sd350:-:*:*:*:*:*:*:*

Configuration 26

AND

OR

cpe:2.3:o:lenovo:thinkserver_td340_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:lenovo:thinkserver_td340:-:*:*:*:*:*:*:*

Configuration 27

AND

OR

cpe:2.3:o:lenovo:thinkserver_td350_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:lenovo:thinkserver_td350:-:*:*:*:*:*:*:*

Configuration 28

AND

OR

cpe:2.3:o:lenovo:thinkserver_ts460_firmware:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:lenovo:thinkserver_ts460:-:*:*:*:*:*:*:*

Tenable Plugins

View all (26 total)

IDNameProductFamilySeverity
136642GLSA-202005-12 : OpenSLP: Multiple vulnerabilitiesNessusGentoo Local Security Checks
critical
127379NewStart CGSL MAIN 4.05 : openslp Vulnerability (NS-SA-2019-0128)NessusNewStart CGSL Local Security Checks
critical
127179NewStart CGSL CORE 5.04 / MAIN 5.04 : openslp Vulnerability (NS-SA-2019-0022)NessusNewStart CGSL Local Security Checks
critical
123218openSUSE Security Update : openslp (openSUSE-2019-514)NessusSuSE Local Security Checks
critical
120210Fedora 28 : openslp (2018-05acd3c734)NessusFedora Local Security Checks
critical
120037SUSE SLED15 / SLES15 Security Update : openslp (SUSE-SU-2018:1917-1)NessusSuSE Local Security Checks
critical
118299SUSE SLES12 Security Update : openslp (SUSE-SU-2018:2991-2)NessusSuSE Local Security Checks
critical
118290SUSE SLES12 Security Update : openslp (SUSE-SU-2018:2779-2)NessusSuSE Local Security Checks
critical
117932SUSE SLED12 / SLES12 Security Update : openslp (SUSE-SU-2018:2991-1)NessusSuSE Local Security Checks
critical
117688openSUSE Security Update : openslp (openSUSE-2018-1040)NessusSuSE Local Security Checks
critical
117661SUSE SLED12 / SLES12 Security Update : openslp (SUSE-SU-2018:2779-1)NessusSuSE Local Security Checks
critical
112085Amazon Linux 2 : openslp (ALAS-2018-1060)NessusAmazon Linux Local Security Checks
critical
111617CentOS 6 : openslp (CESA-2018:2308)NessusCentOS Local Security Checks
critical
111523Scientific Linux Security Update : openslp on SL6.x i386/x86_64 (20180802)NessusScientific Linux Local Security Checks
critical
111492RHEL 6 : openslp (RHSA-2018:2308)NessusRed Hat Local Security Checks
critical
111485Oracle Linux 6 : openslp (ELSA-2018-2308)NessusOracle Linux Local Security Checks
critical
111339CentOS 7 : openslp (CESA-2018:2240)NessusCentOS Local Security Checks
critical
111260Scientific Linux Security Update : openslp on SL7.x x86_64 (20180723)NessusScientific Linux Local Security Checks
critical
111255RHEL 7 : openslp (RHSA-2018:2240)NessusRed Hat Local Security Checks
critical
111252Oracle Linux 7 : openslp (ELSA-2018-2240)NessusOracle Linux Local Security Checks
critical
111096openSUSE Security Update : openslp (openSUSE-2018-725)NessusSuSE Local Security Checks
critical
110975Ubuntu 14.04 LTS / 16.04 LTS : openslp-dfsg vulnerabilities (USN-3708-1)NessusUbuntu Local Security Checks
critical
110972SUSE SLES11 Security Update : openslp (SUSE-SU-2018:1916-1)NessusSuSE Local Security Checks
critical
110875EulerOS 2.0 SP3 : openslp (EulerOS-SA-2018-1211)NessusHuawei Local Security Checks
critical
110874EulerOS 2.0 SP2 : openslp (EulerOS-SA-2018-1210)NessusHuawei Local Security Checks
critical
109348Debian DLA-1364-1 : openslp-dfsg security updateNessusDebian Local Security Checks
critical