First published: Fri Oct 31 2008(Updated: )
Oscar Mira-Sanchez reported (via TippingPoint/ZDI) to Net-SNMP upstream an integer overflow in the numresponses calculation in snmp_agent.c. Size of memory requirement for bulkcache array is calculated based on the values form an SNMP request without properly checking for integer overflows, resulting in an insufficient memory allocation and heap-based buffer overflow. agent/snmp_agent.c: numresponses = asp->pdu->errindex * r; [ ... ] asp->bulkcache = (netsnmp_variable_list **) malloc(numresponses * sizeof(struct varbind_list *)); Issue can be triggered by an SNMP get request.
Affected Software | Affected Version | How to fix |
---|---|---|
Net-SNMP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-469349 is categorized as critical due to the potential for integer overflow leading to memory corruption.
To fix REDHAT-BUG-469349, update your Net-SNMP installation to the latest patched version provided by your distribution.
Systems affected by REDHAT-BUG-469349 may experience crashes or could be susceptible to remote code execution due to the integer overflow.
REDHAT-BUG-469349 affects certain versions of Net-SNMP prior to the release of patches addressing this vulnerability.
As a temporary workaround for REDHAT-BUG-469349, you can disable SNMP agent functionality until the patch is applied.