First published: Fri Oct 31 2008(Updated: )
Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow, related to the number of responses or repeats.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Net-snmp Net-snmp | =5.4 | |
Net-snmp Net-snmp | =5.3.2.2 | |
Net-snmp Net-snmp | =5.2.5 | |
redhat/net-snmp | <0:5.1.2-13.el4_7.2 | 0:5.1.2-13.el4_7.2 |
redhat/net-snmp | <1:5.3.1-24.el5_2.2 | 1:5.3.1-24.el5_2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.