First published: Thu Mar 26 2009(Updated: )
The Simple Network Management Protocol (SNMP) is a protocol used for<br>network management.<br>It was discovered that the snmpd daemon did not use TCP wrappers correctly,<br>causing network hosts access restrictions defined in "/etc/hosts.allow" and<br>"/etc/hosts.deny" to not be honored. A remote attacker could use this flaw<br>to bypass intended access restrictions. (CVE-2008-6123)<br>This issue only affected configurations where hosts.allow and hosts.deny<br>were used to limit access to the SNMP server. To obtain information from<br>the server, the attacker would have to successfully authenticate, usually<br>by providing a correct community string.<br>All net-snmp users should upgrade to these updated packages, which contain<br>a backported patch to correct this issue. After installing the update, the<br>snmpd and snmptrapd daemons will be restarted automatically.
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Net-SNMP Agent Libraries |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2009:0295 is classified as moderate.
To fix RHSA-2009:0295, update the snmpd package to the latest version provided by your distribution.
RHSA-2009:0295 affects systems running configurations with the snmpd daemon.
The RHSA-2009:0295 vulnerability affects the incorrect implementation of TCP wrappers in the snmpd daemon.
A potential workaround for RHSA-2009:0295 includes manually restricting access using firewall rules until a patch is applied.