Improper Data Handling Affecting net-snmp package, versions <5.7.3+dfsg-1.1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-NETSNMP-310837
- published 19 Aug 2015
- disclosed 19 Aug 2015
Introduced: 19 Aug 2015
CVE-2015-5621 Open this link in a new tabHow to fix?
Upgrade Debian:unstable net-snmp to version 5.7.3+dfsg-1.1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream net-snmp package and not the net-snmp package as distributed by Debian.
See How to fix? for Debian:unstable relevant fixed versions and status.
The snmp_pdu_parse function in snmp_api.c in net-snmp 5.7.2 and earlier does not remove the varBind variable in a netsnmp_variable_list item when parsing of the SNMP PDU fails, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet.
References
- https://security-tracker.debian.org/tracker/CVE-2015-5621
- https://cert-portal.siemens.com/productcert/pdf/ssa-978220.pdf
- http://sourceforge.net/p/net-snmp/code/ci/f23bcd3ac6ddee5d0a48f9703007ccc738914791/
- https://sourceforge.net/p/net-snmp/bugs/2615/
- http://support.citrix.com/article/CTX209443
- https://www.debian.org/security/2018/dsa-4154
- https://www.exploit-db.com/exploits/45547/
- http://lists.opensuse.org/opensuse-updates/2015-09/msg00004.html
- http://www.openwall.com/lists/oss-security/2015/04/13/1
- http://www.openwall.com/lists/oss-security/2015/04/16/15
- http://www.openwall.com/lists/oss-security/2015/07/31/1
- https://bugzilla.redhat.com/show_bug.cgi?id=1212408
- http://rhn.redhat.com/errata/RHSA-2015-1636.html
- http://www.securityfocus.com/bid/76380
- http://www.securitytracker.com/id/1033304
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-5621
- http://www.ubuntu.com/usn/USN-2711-1