The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote attacker to register arbitrary services. This could allow the attacker to use spoofed UDP traffic to conduct a denial-of-service attack with a significant amplification factor.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 07:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://blogs.vmware.com/security/2023/04/vmware-response-to-cve-2023-29552-reflective-denial-of-service-dos-amplification-vulnerability-in-slp.html - Third Party Advisory | |
References | () https://curesec.com/blog/article/CVE-2023-29552-Service-Location-Protocol-Denial-of-Service-Amplification-Attack-212.html - Exploit, Third Party Advisory | |
References | () https://datatracker.ietf.org/doc/html/rfc2608 - Technical Description | |
References | () https://github.com/curesec/slpload - Product | |
References | () https://security.netapp.com/advisory/ntap-20230426-0001/ - Third Party Advisory | |
References | () https://www.bitsight.com/blog/new-high-severity-vulnerability-cve-2023-29552-discovered-service-location-protocol-slp - Exploit, Third Party Advisory | |
References | () https://www.cisa.gov/news-events/alerts/2023/04/25/abuse-service-location-protocol-may-lead-dos-attacks - Third Party Advisory, US Government Resource | |
References | () https://www.suse.com/support/kb/doc/?id=000021051 - Third Party Advisory |
Information
Published : 2023-04-25 16:15
Updated : 2024-11-21 07:57
NVD link : CVE-2023-29552
Mitre link : CVE-2023-29552
CVE.ORG link : CVE-2023-29552
JSON object : View
Products Affected
suse
- linux_enterprise_server
- manager_server
vmware
- esxi
service_location_protocol_project
- service_location_protocol
netapp
- smi-s_provider
CWE