First published: Fri Jul 01 2022(Updated: )
+*5.9.2*: + security: + - These two CVEs can be exploited by a user with read-only credentials: + - <a href="https://access.redhat.com/security/cve/CVE-2022-24805">CVE-2022-24805</a> A buffer overflow in the handling of the INDEX of + NET-SNMP-VACM-MIB can cause an out-of-bounds memory access. + - <a href="https://access.redhat.com/security/cve/CVE-2022-24809">CVE-2022-24809</a> A malformed OID in a GET-NEXT to the nsVacmAccessTable + can cause a NULL pointer dereference. + - These CVEs can be exploited by a user with read-write credentials: + - <a href="https://access.redhat.com/security/cve/CVE-2022-24806">CVE-2022-24806</a> Improper Input Validation when SETing malformed + OIDs in master agent and subagent simultaneously + - <a href="https://access.redhat.com/security/cve/CVE-2022-24807">CVE-2022-24807</a> A malformed OID in a SET request to + SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an + out-of-bounds memory access. + - <a href="https://access.redhat.com/security/cve/CVE-2022-24808">CVE-2022-24808</a> A malformed OID in a SET request to + NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference + - <a href="https://access.redhat.com/security/cve/CVE-2022-24810">CVE-2022-24810</a> A malformed OID in a SET to the nsVacmAccessTable + can cause a NULL pointer dereference. + - To avoid these flaws, use strong SNMPv3 credentials and do not share them. + If you must use SNMPv1 or SNMPv2c, use a complex community string + and enhance the protection by restricting access to a given IP address range. + - Thanks are due to Yu Zhang of VARAS@IIE and Nanyu Zhong of VARAS@IIE for + reporting the following CVEs that have been fixed in this release, and + to Arista Networks for providing fixes.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/net-snmp | <5.9.2 | 5.9.2 |
Net-SNMP | <5.9.2 | |
Red Hat Fedora | =36 | |
Debian Linux | =10.0 | |
Debian Linux | =11.0 | |
Red Hat Enterprise Linux | =9.0 | |
Red Hat Enterprise Linux Server EUS | =9.2 | |
Red Hat Enterprise Linux Server EUS | =9.4 | |
Red Hat Enterprise Linux | =9.0 | |
Red Hat Enterprise Linux | =9.2_aarch64 | |
Red Hat Enterprise Linux | =9.4_aarch64 | |
Red Hat Enterprise Linux for ARM64 EUS | =9.4_aarch64 | |
Red Hat Enterprise Linux for IBM Z Systems | =9.0 | |
Red Hat Enterprise Linux for IBM Z Systems | =9.2_s390x | |
Red Hat Enterprise Linux for IBM Z Systems | =9.4_s390x | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =9.4_s390x | |
Red Hat Enterprise Linux for Power, little endian | =9.0 | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =9.2_ppc64le | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =9.4_ppc64le | |
Red Hat Enterprise Linux Server | =9.2 | |
Red Hat Enterprise Linux Server | =9.4 | |
Red Hat Enterprise Linux for SAP Applications for Power, little endian - Extended Update Support | =9.2_ppc64le | |
Red Hat Enterprise Linux Server Update Services for SAP Solutions | =9.2 | |
Red Hat Enterprise Linux for SAP Solutions | =9.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24805 has been classified as a high severity vulnerability.
To resolve CVE-2022-24805, update the affected Net-SNMP version to 5.9.2 or later.
CVE-2022-24805 is a buffer overflow vulnerability.
CVE-2022-24805 affects users with read-only credentials using certain versions of Net-SNMP.
CVE-2022-24805 affects multiple systems including Red Hat Enterprise Linux and various Debian versions.