[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

247085

 
 

909

 
 

194218

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-1663 net-snmp -- several vulnerabilities

ID: oval:org.mitre.oval:def:7025Date: (C)2009-12-15   (M)2023-11-09
Class: PATCHFamily: unix




Several vulnerabilities have been discovered in NET SNMP, a suite of Simple Network Management Protocol applications. The Common Vulnerabilities and Exposures project identifies the following problems: Wes Hardaker reported that the SNMPv3 HMAC verification relies on the client to specify the HMAC length, which allows spoofing of authenticated SNMPv3 packets. John Kortink reported a buffer overflow in the __snprint_value function in snmp_get causing a denial of service and potentially allowing the execution of arbitrary code via a large OCTETSTRING in an attribute value pair (AVP). It was reported that an integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c allows remote attackers to cause a denial of service attack via a crafted SNMP GETBULK request.

Platform:
Debian 4.0
Product:
net-snmp
Reference:
DSA-1663
CVE-2008-0960
CVE-2008-2292
CVE-2008-4309
CVE    3
CVE-2008-0960
CVE-2008-2292
CVE-2008-4309
CPE    1
cpe:/o:debian:debian_linux:4.0

© SecPod Technologies