CVE-2023-29552

The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote attacker to register arbitrary services. This could allow the attacker to use spoofed UDP traffic to conduct a denial-of-service attack with a significant amplification factor.
References
Link Resource
https://blogs.vmware.com/security/2023/04/vmware-response-to-cve-2023-29552-reflective-denial-of-service-dos-amplification-vulnerability-in-slp.html Third Party Advisory
https://curesec.com/blog/article/CVE-2023-29552-Service-Location-Protocol-Denial-of-Service-Amplification-Attack-212.html Exploit Third Party Advisory
https://datatracker.ietf.org/doc/html/rfc2608 Technical Description
https://github.com/curesec/slpload Product
https://security.netapp.com/advisory/ntap-20230426-0001/ Third Party Advisory
https://www.bitsight.com/blog/new-high-severity-vulnerability-cve-2023-29552-discovered-service-location-protocol-slp Exploit Third Party Advisory
https://www.cisa.gov/news-events/alerts/2023/04/25/abuse-service-location-protocol-may-lead-dos-attacks Third Party Advisory US Government Resource
https://www.suse.com/support/kb/doc/?id=000021051 Third Party Advisory
https://blogs.vmware.com/security/2023/04/vmware-response-to-cve-2023-29552-reflective-denial-of-service-dos-amplification-vulnerability-in-slp.html Third Party Advisory
https://curesec.com/blog/article/CVE-2023-29552-Service-Location-Protocol-Denial-of-Service-Amplification-Attack-212.html Exploit Third Party Advisory
https://datatracker.ietf.org/doc/html/rfc2608 Technical Description
https://github.com/curesec/slpload Product
https://security.netapp.com/advisory/ntap-20230426-0001/ Third Party Advisory
https://www.bitsight.com/blog/new-high-severity-vulnerability-cve-2023-29552-discovered-service-location-protocol-slp Exploit Third Party Advisory
https://www.cisa.gov/news-events/alerts/2023/04/25/abuse-service-location-protocol-may-lead-dos-attacks Third Party Advisory US Government Resource
https://www.suse.com/support/kb/doc/?id=000021051 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:netapp:smi-s_provider:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:suse:manager_server:-:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:sap:*:*
cpe:2.3:o:suse:linux_enterprise_server:15:*:*:*:*:-:*:*
cpe:2.3:o:suse:linux_enterprise_server:15:*:*:*:*:sap:*:*

Configuration 3 (hide)

cpe:2.3:o:vmware:esxi:*:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:a:service_location_protocol_project:service_location_protocol:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:57

Type Values Removed Values Added
References () https://blogs.vmware.com/security/2023/04/vmware-response-to-cve-2023-29552-reflective-denial-of-service-dos-amplification-vulnerability-in-slp.html - Third Party Advisory () https://blogs.vmware.com/security/2023/04/vmware-response-to-cve-2023-29552-reflective-denial-of-service-dos-amplification-vulnerability-in-slp.html - Third Party Advisory
References () https://curesec.com/blog/article/CVE-2023-29552-Service-Location-Protocol-Denial-of-Service-Amplification-Attack-212.html - Exploit, Third Party Advisory () https://curesec.com/blog/article/CVE-2023-29552-Service-Location-Protocol-Denial-of-Service-Amplification-Attack-212.html - Exploit, Third Party Advisory
References () https://datatracker.ietf.org/doc/html/rfc2608 - Technical Description () https://datatracker.ietf.org/doc/html/rfc2608 - Technical Description
References () https://github.com/curesec/slpload - Product () https://github.com/curesec/slpload - Product
References () https://security.netapp.com/advisory/ntap-20230426-0001/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20230426-0001/ - Third Party Advisory
References () https://www.bitsight.com/blog/new-high-severity-vulnerability-cve-2023-29552-discovered-service-location-protocol-slp - Exploit, Third Party Advisory () https://www.bitsight.com/blog/new-high-severity-vulnerability-cve-2023-29552-discovered-service-location-protocol-slp - Exploit, Third Party Advisory
References () https://www.cisa.gov/news-events/alerts/2023/04/25/abuse-service-location-protocol-may-lead-dos-attacks - Third Party Advisory, US Government Resource () https://www.cisa.gov/news-events/alerts/2023/04/25/abuse-service-location-protocol-may-lead-dos-attacks - Third Party Advisory, US Government Resource
References () https://www.suse.com/support/kb/doc/?id=000021051 - Third Party Advisory () https://www.suse.com/support/kb/doc/?id=000021051 - Third Party Advisory

Information

Published : 2023-04-25 16:15

Updated : 2024-11-21 07:57


NVD link : CVE-2023-29552

Mitre link : CVE-2023-29552

CVE.ORG link : CVE-2023-29552


JSON object : View

Products Affected

suse

  • linux_enterprise_server
  • manager_server

vmware

  • esxi

service_location_protocol_project

  • service_location_protocol

netapp

  • smi-s_provider