First published: Mon Oct 15 2018(Updated: )
It was discovered that Net-SNMP incorrectly handled certain certain crafted packets. A remote attacker could possibly use this issue to cause Net-SNMP to crash, resulting in a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libsnmp30 | <5.7.3+dfsg-1.8ubuntu3.1 | 5.7.3+dfsg-1.8ubuntu3.1 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/libsnmp30 | <5.7.3+dfsg-1ubuntu4.2 | 5.7.3+dfsg-1ubuntu4.2 |
Ubuntu Ubuntu | =16.04 | |
All of | ||
ubuntu/libsnmp30 | <5.7.2~dfsg-8.1ubuntu3.3 | 5.7.2~dfsg-8.1ubuntu3.3 |
Ubuntu Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Net-SNMP vulnerability is USN-3792-1.
The impact of this Net-SNMP vulnerability is a denial of service, as it can cause Net-SNMP to crash.
A remote attacker can exploit this Net-SNMP vulnerability by sending crafted packets.
Versions 5.7.3+dfsg-1.8ubuntu3.1, 5.7.3+dfsg-1ubuntu4.2, and 5.7.2~dfsg-8.1ubuntu3.3 of libsnmp30 are affected by this vulnerability.
To fix the Net-SNMP vulnerability, update to version 5.7.3+dfsg-1.8ubuntu3.1 of libsnmp30 for Ubuntu 18.04, version 5.7.3+dfsg-1ubuntu4.2 for Ubuntu 16.04, or version 5.7.2~dfsg-8.1ubuntu3.3 for Ubuntu 14.04.