First published: Tue Dec 09 2008(Updated: )
A possibility of sensitive host information disclosure was found in the implementation of SNMP protocol as defined in RFC 1065, RFC 1066, and RFC 1067. If the snmpd deamon was running on the host, it served the SNMP queries regardless of the fact, the IP address of the requester was not mentioned in the list of hosts allowed to issue / request SNMP MIB objects information. Remote attacker could use this flaw to gain host related sensitive information via performing a SNMP query. References: <a href="http://bugs.gentoo.org/show_bug.cgi?id=250429">http://bugs.gentoo.org/show_bug.cgi?id=250429</a> Upstream patch: <a href="http://net-snmp.svn.sourceforge.net/viewvc/net-snmp?view=rev&revision=17367">http://net-snmp.svn.sourceforge.net/viewvc/net-snmp?view=rev&revision=17367</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Net-snmp Net-snmp | =5.3 | |
Net-snmp Net-snmp | =5.0.9 | |
Net-snmp Net-snmp | =5.2.1.2_r1 | |
Net-snmp Net-snmp | =5.1.4 | |
Net-snmp Net-snmp | =5.2.4 | |
Net-snmp Net Snmp | =5.1.1 | |
Net-snmp Net-snmp | =5.2.1 | |
Net-snmp Net Snmp | =5.3.0.1 | |
Net-snmp Net-snmp | =5.2 | |
Net-snmp Net-snmp | =5.1.3 | |
Net-snmp Net-snmp | =5.4 | |
Net-snmp Net-snmp | =5.4.1 | |
Net-snmp Net-snmp | =5.3.2.2 | |
Net-snmp Net-snmp | =5.2.5 | |
Net-snmp Net-snmp | =5.1.2 | |
Net-snmp Net-snmp | =5.4.2 | |
Net-snmp Net-snmp | =5.0.10 | |
Net-snmp Net Snmp | =5.1 | |
Net-snmp Net Snmp | =5.4 | |
Net-snmp Net-snmp | >=5.0.9<=5.4.2.1 | |
openSUSE openSUSE | =10.3-11.1 | |
openSUSE openSUSE | =11.2 | |
SUSE Linux Enterprise | =9-11 | |
Redhat Enterprise Linux | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.