First published: Mon Mar 24 2014(Updated: )
The Linux implementation of the ICMP-MIB in Net-SNMP 5.5 before 5.5.2.1, 5.6.x before 5.6.2.1, and 5.7.x before 5.7.2.1 does not properly validate input, which allows remote attackers to cause a denial of service via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Net-SNMP Agent Libraries | =5.5 | |
CentOS Net-SNMP Agent Libraries | =5.5.0.1 | |
CentOS Net-SNMP Agent Libraries | =5.5.0.2 | |
CentOS Net-SNMP Agent Libraries | =5.5.1 | |
CentOS Net-SNMP Agent Libraries | =5.5.1.1 | |
CentOS Net-SNMP Agent Libraries | =5.5.2 | |
CentOS Net-SNMP Agent Libraries | =5.6 | |
CentOS Net-SNMP Agent Libraries | =5.6.1.1 | |
CentOS Net-SNMP Agent Libraries | =5.6.2 | |
CentOS Net-SNMP Agent Libraries | =5.7 | |
CentOS Net-SNMP Agent Libraries | =5.7.1 | |
CentOS Net-SNMP Agent Libraries | =5.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2284 has a severity rating that allows remote attackers to cause a denial of service.
To fix CVE-2014-2284, upgrade to Net-SNMP version 5.5.2.1 or later, 5.6.2.1 or later, or 5.7.2.1 or later.
Versions of Net-SNMP affected by CVE-2014-2284 include 5.5, 5.6.x before 5.6.2.1, and 5.7.x before 5.7.2.1.
Yes, CVE-2014-2284 can be exploited remotely by attackers through unspecified vectors.
CVE-2014-2284 is categorized as a denial of service vulnerability affecting the ICMP-MIB implementation in Net-SNMP.