First published: Wed Mar 05 2014(Updated: )
A remote denial-of-Service flaw was found in the way snmptrapd handled trap requests with empty community string, when the perl handler was enabled. A remote attacker could use this flaw to cause snmp to crash. More details about the flaw is available at: <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED WONTFIX - snmptrapd segfaults under specific conditions" href="show_bug.cgi?id=1072044">https://bugzilla.redhat.com/show_bug.cgi?id=1072044</a> Proposed upstream patch: <a href="http://sourceforge.net/p/net-snmp/patches/1275/">http://sourceforge.net/p/net-snmp/patches/1275/</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Net-snmp Net-snmp | <=5.7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.