First published: Sun Jul 10 2005(Updated: )
Net-SNMP 5.0.x before 5.0.10.2, 5.2.x before 5.2.1.2, and 5.1.3, when net-snmp is using stream sockets such as TCP, allows remote attackers to cause a denial of service (daemon hang and CPU consumption) via a TCP packet of length 1, which triggers an infinite loop.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Net-snmp Net-snmp | =5.0.6 | |
Net-snmp Net-snmp | =5.0.9 | |
Net-snmp Net-snmp | =5.0 | |
Net-snmp Net-snmp | =5.0.4_pre2 | |
Net-snmp Net-snmp | =5.0.7 | |
Net-snmp Net-snmp | =5.2.1 | |
Net-snmp Net-snmp | =5.0.2 | |
Net-snmp Net-snmp | =5.2 | |
Net-snmp Net-snmp | =5.0.1 | |
Net-snmp Net-snmp | =5.1.3 | |
Net-snmp Net-snmp | =5.0.3 | |
Net-snmp Net-snmp | =5.0.5 | |
Net-snmp Net-snmp | =5.0.10 | |
Net-snmp Net-snmp | =5.0.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.