First published: Fri Dec 31 2004(Updated: )
Buffer overflow in snmpd in ucd-snmp 4.2.6 and earlier, when installed setuid root, allows local users to execute arbitrary code via a long -p command line argument. NOTE: it is not clear whether there are any standard configurations in which snmpd is installed setuid or setgid. If not, then this issue should not be included in CVE.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
vne-snmp | <=4.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-2300 is rated as a critical vulnerability due to its potential to allow local users to execute arbitrary code.
To fix CVE-2004-2300, upgrade to ucd-snmp version 4.2.7 or later, which addresses the buffer overflow issue.
CVE-2004-2300 affects ucd-snmp versions 4.2.6 and earlier, especially if installed with setuid root permissions.
CVE-2004-2300 is primarily a local privilege escalation vulnerability and is not exploitable remotely under standard configurations.
Exploiting CVE-2004-2300 can lead to arbitrary code execution with elevated privileges, compromising the affected system.