2023-04-07 21:00:34 +00:00
{
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
"data_version" : "4.0" ,
"CVE_data_meta" : {
"ID" : "CVE-2023-29552" ,
"ASSIGNER" : "cve@mitre.org" ,
2023-04-25 16:00:37 +00:00
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
]
}
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"refsource" : "MISC" ,
"name" : "https://datatracker.ietf.org/doc/html/rfc2608" ,
"url" : "https://datatracker.ietf.org/doc/html/rfc2608"
} ,
{
"refsource" : "MISC" ,
"name" : "https://www.bitsight.com/blog/new-high-severity-vulnerability-cve-2023-29552-discovered-service-location-protocol-slp" ,
"url" : "https://www.bitsight.com/blog/new-high-severity-vulnerability-cve-2023-29552-discovered-service-location-protocol-slp"
} ,
{
"refsource" : "MISC" ,
"name" : "https://blogs.vmware.com/security/2023/04/vmware-response-to-cve-2023-29552-reflective-denial-of-service-dos-amplification-vulnerability-in-slp.html" ,
"url" : "https://blogs.vmware.com/security/2023/04/vmware-response-to-cve-2023-29552-reflective-denial-of-service-dos-amplification-vulnerability-in-slp.html"
2023-04-25 18:00:37 +00:00
} ,
{
"refsource" : "MISC" ,
"name" : "https://www.cisa.gov/news-events/alerts/2023/04/25/abuse-service-location-protocol-may-lead-dos-attacks" ,
"url" : "https://www.cisa.gov/news-events/alerts/2023/04/25/abuse-service-location-protocol-may-lead-dos-attacks"
2023-04-25 19:00:38 +00:00
} ,
{
"refsource" : "MISC" ,
"name" : "https://www.suse.com/support/kb/doc/?id=000021051" ,
"url" : "https://www.suse.com/support/kb/doc/?id=000021051"
2023-04-26 14:00:37 +00:00
} ,
{
"refsource" : "MISC" ,
"name" : "https://curesec.com/blog/article/CVE-2023-29552-Service-Location-Protocol-Denial-of-Service-Amplification-Attack-212.html" ,
"url" : "https://curesec.com/blog/article/CVE-2023-29552-Service-Location-Protocol-Denial-of-Service-Amplification-Attack-212.html"
} ,
{
"refsource" : "MISC" ,
"name" : "https://github.com/curesec/slpload" ,
"url" : "https://github.com/curesec/slpload"
2023-04-26 22:00:34 +00:00
} ,
{
"refsource" : "CONFIRM" ,
"name" : "https://security.netapp.com/advisory/ntap-20230426-0001/" ,
"url" : "https://security.netapp.com/advisory/ntap-20230426-0001/"
2023-04-25 16:00:37 +00:00
}
]
2023-04-07 21:00:34 +00:00
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2023-04-25 16:00:37 +00:00
"value" : "The Service Location Protocol (SLP, RFC 2608) allows an unauthenticated, remote attacker to register arbitrary services. This could allow the attacker to use spoofed UDP traffic to conduct a denial-of-service attack with a significant amplification factor."
2023-04-07 21:00:34 +00:00
}
]
}
}