First published: Mon Aug 24 2020(Updated: )
Tobias Neitzel discovered that Net-SNMP incorrectly handled certain symlinks. An attacker could possibly use this issue to access sensitive information. (CVE-2020-15861) It was discovered that Net-SNMP incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 14.04 ESM, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2020-15862)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libsnmp-base | <5.8+dfsg-2ubuntu2.3 | 5.8+dfsg-2ubuntu2.3 |
=20.04 | ||
All of | ||
ubuntu/libsnmp-perl | <5.8+dfsg-2ubuntu2.3 | 5.8+dfsg-2ubuntu2.3 |
=20.04 | ||
All of | ||
ubuntu/libsnmp35 | <5.8+dfsg-2ubuntu2.3 | 5.8+dfsg-2ubuntu2.3 |
=20.04 | ||
All of | ||
ubuntu/snmpd | <5.8+dfsg-2ubuntu2.3 | 5.8+dfsg-2ubuntu2.3 |
=20.04 | ||
All of | ||
ubuntu/libsnmp-base | <5.7.3+dfsg-1.8ubuntu3.5 | 5.7.3+dfsg-1.8ubuntu3.5 |
=18.04 | ||
All of | ||
ubuntu/libsnmp-perl | <5.7.3+dfsg-1.8ubuntu3.5 | 5.7.3+dfsg-1.8ubuntu3.5 |
=18.04 | ||
All of | ||
ubuntu/libsnmp30 | <5.7.3+dfsg-1.8ubuntu3.5 | 5.7.3+dfsg-1.8ubuntu3.5 |
=18.04 | ||
All of | ||
ubuntu/snmpd | <5.7.3+dfsg-1.8ubuntu3.5 | 5.7.3+dfsg-1.8ubuntu3.5 |
=18.04 | ||
All of | ||
ubuntu/libsnmp-base | <5.7.3+dfsg-1ubuntu4.5 | 5.7.3+dfsg-1ubuntu4.5 |
=16.04 | ||
All of | ||
ubuntu/libsnmp-perl | <5.7.3+dfsg-1ubuntu4.5 | 5.7.3+dfsg-1ubuntu4.5 |
=16.04 | ||
All of | ||
ubuntu/libsnmp30 | <5.7.3+dfsg-1ubuntu4.5 | 5.7.3+dfsg-1ubuntu4.5 |
=16.04 | ||
All of | ||
ubuntu/snmpd | <5.7.3+dfsg-1ubuntu4.5 | 5.7.3+dfsg-1ubuntu4.5 |
=16.04 | ||
All of | ||
ubuntu/libsnmp-base | <5.7.2~dfsg-8.1ubuntu3.3+esm1 | 5.7.2~dfsg-8.1ubuntu3.3+esm1 |
=14.04 | ||
All of | ||
ubuntu/libsnmp-perl | <5.7.2~dfsg-8.1ubuntu3.3+esm1 | 5.7.2~dfsg-8.1ubuntu3.3+esm1 |
=14.04 | ||
All of | ||
ubuntu/libsnmp30 | <5.7.2~dfsg-8.1ubuntu3.3+esm1 | 5.7.2~dfsg-8.1ubuntu3.3+esm1 |
=14.04 | ||
All of | ||
ubuntu/snmpd | <5.7.2~dfsg-8.1ubuntu3.3+esm1 | 5.7.2~dfsg-8.1ubuntu3.3+esm1 |
=14.04 | ||
All of | ||
ubuntu/libsnmp-base | <5.4.3~dfsg-2.4ubuntu1.5 | 5.4.3~dfsg-2.4ubuntu1.5 |
=12.04 | ||
All of | ||
ubuntu/libsnmp-perl | <5.4.3~dfsg-2.4ubuntu1.5 | 5.4.3~dfsg-2.4ubuntu1.5 |
=12.04 | ||
All of | ||
ubuntu/libsnmp15 | <5.4.3~dfsg-2.4ubuntu1.5 | 5.4.3~dfsg-2.4ubuntu1.5 |
=12.04 | ||
All of | ||
ubuntu/snmpd | <5.4.3~dfsg-2.4ubuntu1.5 | 5.4.3~dfsg-2.4ubuntu1.5 |
=12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Net-SNMP vulnerability is CVE-2020-15861.
An attacker can exploit the Net-SNMP vulnerability with CVE-2020-15861 to access sensitive information.
The Net-SNMP vulnerability with CVE-2020-15861 affects versions 5.8+dfsg-2ubuntu2.3, 5.7.3+dfsg-1.8ubuntu3.5, 5.7.2~dfsg-8.1ubuntu3.3+esm1, and 5.4.3~dfsg-2.4ubuntu1.5.
To fix the Net-SNMP vulnerability with CVE-2020-15861, update the affected software to version 5.8+dfsg-2ubuntu2.3 or higher.
More information about the Net-SNMP vulnerability with CVE-2020-15861 can be found at the following link: https://ubuntu.com/security/CVE-2020-15861