First published: Thu May 22 2008(Updated: )
CERT has told us of an authentication bypass flaw in Net-SNMP and UCD-SNMP. According to net-snmp: "The quick technical summary is that the SNMPv3 packet contains a truncated HMAC authentication code. The author that wrote the code very very long ago to check that HMAC code used the length of the packet's version of the HMAC code to do the check. Thus if you send a single byte HMAC code, it'll only check it against the first byte of HMAC output. Thus it's fairly easy to spoof an authenticated SNMPv3 packet."
Affected Software | Affected Version | How to fix |
---|---|---|
Net-SNMP | ||
vne-snmp |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-447974 is classified as critical due to its nature as an authentication bypass flaw.
To fix REDHAT-BUG-447974, you should apply the relevant patches provided by the maintainers of Net-SNMP and UCD-SNMP.
REDHAT-BUG-447974 affects systems running Net-SNMP and UCD-SNMP versions that utilize SNMPv3.
Yes, there are known exploits for REDHAT-BUG-447974 that can be used to bypass authentication and gain unauthorized access.
Exploiting REDHAT-BUG-447974 can allow attackers to access sensitive information and potentially control networked devices.