Resource Management Errors Affecting net-snmp package, versions <5.7.2.1~dfsg-7
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-NETSNMP-310823
- published 7 Oct 2014
- disclosed 7 Oct 2014
Introduced: 7 Oct 2014
CVE-2014-3565 Open this link in a new tabHow to fix?
Upgrade Debian:unstable net-snmp to version 5.7.2.1~dfsg-7 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream net-snmp package and not the net-snmp package as distributed by Debian.
See How to fix? for Debian:unstable relevant fixed versions and status.
snmplib/mib.c in net-snmp 5.7.0 and earlier, when the -OQ option is used, allows remote attackers to cause a denial of service (snmptrapd crash) via a crafted SNMP trap message, which triggers a conversion to the variable type designated in the MIB file, as demonstrated by a NULL type in an ifMtu trap message.
References
- https://security-tracker.debian.org/tracker/CVE-2014-3565
- https://support.apple.com/HT205375
- http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html
- https://security.gentoo.org/glsa/201507-17
- http://sourceforge.net/p/net-snmp/code/ci/7f4a7b891332899cea26e95be0337aae01648742/
- http://sourceforge.net/p/net-snmp/official-patches/48/
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00013.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1125155
- http://rhn.redhat.com/errata/RHSA-2015-1385.html
- http://www.securityfocus.com/bid/69477
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-3565
- http://www.ubuntu.com/usn/USN-2711-1
- https://access.redhat.com/errata/RHSA-2015:1385
- https://access.redhat.com/errata/RHSA-2015:2345
- https://access.redhat.com/security/cve/CVE-2014-3565