First published: Mon Nov 07 2022(Updated: )
handle_ipDefaultTTL in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.8 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker (who has write access) to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Net-snmp Net-snmp | >=5.8<=5.9.3 | |
Debian Debian Linux | =10.0 | |
Netapp H300s Firmware | ||
Netapp H300s | ||
Netapp H500s Firmware | ||
Netapp H500s | ||
Netapp H700s Firmware | ||
Netapp H700s | ||
Netapp H410s Firmware | ||
Netapp H410s | ||
All of | ||
Netapp H300s Firmware | ||
Netapp H300s | ||
All of | ||
Netapp H500s Firmware | ||
Netapp H500s | ||
All of | ||
Netapp H700s Firmware | ||
Netapp H700s | ||
All of | ||
Netapp H410s Firmware | ||
Netapp H410s |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-44792 is a vulnerability in the Net-SNMP software that allows a remote attacker to crash the instance via a crafted UDP packet, resulting in a Denial of Service.
CVE-2022-44792 has a severity value of 6.5, which is considered medium.
Net-SNMP versions 5.8 through 5.9.3 are affected by CVE-2022-44792.
There is currently no official fix for CVE-2022-44792. It is recommended to update to a version of Net-SNMP that is not affected by this vulnerability, when one becomes available.
You can find more information about CVE-2022-44792 at the following references: [link1], [link2], [link3].