First published: Fri Oct 31 2008(Updated: )
Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow, related to the number of responses or repeats.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/net-snmp | <0:5.1.2-13.el4_7.2 | 0:5.1.2-13.el4_7.2 |
redhat/net-snmp | <1:5.3.1-24.el5_2.2 | 1:5.3.1-24.el5_2.2 |
CentOS Net-SNMP Agent Libraries | =5.2.5 | |
CentOS Net-SNMP Agent Libraries | =5.3.2.2 | |
CentOS Net-SNMP Agent Libraries | =5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-4309 is a high severity vulnerability that can lead to denial of service through a crafted SNMP GETBULK request.
To fix CVE-2008-4309, upgrade to net-snmp version 5.4.2.1 or later for affected systems.
Versions of net-snmp before 5.4.2.1, 5.3.2.3, and 5.2.5.1 are vulnerable to CVE-2008-4309.
CVE-2008-4309 allows remote attackers to conduct a denial of service attack by triggering a heap-based buffer overflow.
Yes, the vulnerability affects the net-snmp package provided by Red Hat for specific versions.