First published: Thu Feb 12 2009(Updated: )
A possibility of sensitive host information disclosure was found in the implementation of SNMP protocol as defined in RFC 1065, RFC 1066, and RFC 1067. If the snmpd deamon was running on the host, it served the SNMP queries regardless of the fact, the IP address of the requester was not mentioned in the list of hosts allowed to issue / request SNMP MIB objects information. Remote attacker could use this flaw to gain host related sensitive information via performing a SNMP query. References: <a href="http://bugs.gentoo.org/show_bug.cgi?id=250429">http://bugs.gentoo.org/show_bug.cgi?id=250429</a> Upstream patch: <a href="http://net-snmp.svn.sourceforge.net/viewvc/net-snmp?view=rev&revision=17367">http://net-snmp.svn.sourceforge.net/viewvc/net-snmp?view=rev&revision=17367</a>
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Net-SNMP Agent Libraries |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-485211 is considered high due to the potential for sensitive information disclosure.
To fix REDHAT-BUG-485211, ensure that the SNMP daemon is not running or apply the latest security updates recommended by the vendor.
REDHAT-BUG-485211 affects systems running the Net-SNMP implementation of the SNMP protocol.
Due to REDHAT-BUG-485211, sensitive host information such as system configurations and network details may be disclosed.
A possible workaround for REDHAT-BUG-485211 is to restrict access to the SNMP service by configuring firewall rules.