OpenSLP as used in ESXi (7.0 before ESXi70U1c-17325551, 6.7 before ESXi670-202102401-SG, 6.5 before ESXi650-202102101-SG) has a heap-overflow vulnerability. A malicious actor residing within the same network segment as ESXi who has access to port 427 may be able to trigger the heap-overflow issue in OpenSLP service resulting in remote code execution.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/162957/VMware-ESXi-OpenSLP-Heap-Overflow.html | Exploit Third Party Advisory VDB Entry |
https://www.vmware.com/security/advisories/VMSA-2021-0002.html | Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-21-250/ | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/162957/VMware-ESXi-OpenSLP-Heap-Overflow.html | Exploit Third Party Advisory VDB Entry |
https://www.vmware.com/security/advisories/VMSA-2021-0002.html | Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-21-250/ | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 05:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/162957/VMware-ESXi-OpenSLP-Heap-Overflow.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.vmware.com/security/advisories/VMSA-2021-0002.html - Vendor Advisory | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-21-250/ - Third Party Advisory, VDB Entry |
Information
Published : 2021-02-24 17:15
Updated : 2024-11-21 05:49
NVD link : CVE-2021-21974
Mitre link : CVE-2021-21974
CVE.ORG link : CVE-2021-21974
JSON object : View
Products Affected
vmware
- esxi
- cloud_foundation
CWE
CWE-787
Out-of-bounds Write