First published: Wed Mar 05 2014(Updated: )
A remote denial-of-Service flaw was found in the way snmptrapd handled trap requests with empty community string, when the perl handler was enabled. A remote attacker could use this flaw to cause snmp to crash. More details about the flaw is available at: <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED WONTFIX - snmptrapd segfaults under specific conditions" href="show_bug.cgi?id=1072044">https://bugzilla.redhat.com/show_bug.cgi?id=1072044</a> Proposed upstream patch: <a href="http://sourceforge.net/p/net-snmp/patches/1275/">http://sourceforge.net/p/net-snmp/patches/1275/</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Net-SNMP Agent Libraries | <=5.7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2285 is classified as a high severity denial-of-service vulnerability.
CVE-2014-2285 can cause snmptrapd to crash when it processes trap requests with an empty community string.
To fix CVE-2014-2285, upgrade to a version of Net-SNMP newer than 5.7.3 where this vulnerability is addressed.
Net-SNMP versions up to and including 5.7.3 are vulnerable to CVE-2014-2285.
A potential workaround for CVE-2014-2285 is to disable the perl handler in snmptrapd configuration.