Resource Management Errors Affecting net-snmp package, versions <5.4.1~dfsg-1
Threat Intelligence
EPSS
79.39% (99th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-NETSNMP-310847
- published 6 Nov 2007
- disclosed 6 Nov 2007
Introduced: 6 Nov 2007
CVE-2007-5846 Open this link in a new tabHow to fix?
Upgrade Debian:unstable net-snmp to version 5.4.1~dfsg-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream net-snmp package and not the net-snmp package as distributed by Debian.
See How to fix? for Debian:unstable relevant fixed versions and status.
The SNMP agent (snmp_agent.c) in net-snmp before 5.4.1 allows remote attackers to cause a denial of service (CPU and memory consumption) via a GETBULK request with a large max-repeaters value.
References
- https://security-tracker.debian.org/tracker/CVE-2007-5846
- http://www.securityfocus.com/archive/1/490917/100/0/threaded
- http://bugs.gentoo.org/show_bug.cgi?id=198346
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730
- http://sourceforge.net/project/shownotes.php?release_id=528095&group_id=12694
- http://sourceforge.net/tracker/index.php?func=detail&aid=1712988&group_id=12694&atid=112694
- http://www.debian.org/security/2008/dsa-1483
- https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00613.html
- http://security.gentoo.org/glsa/glsa-200711-31.xml
- http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/tags/Ext-5-4-1/net-snmp/agent/snmp_agent.c?view=log
- http://lists.vmware.com/pipermail/security-announce/2008/000014.html
- http://osvdb.org/38904
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11258
- http://secunia.com/advisories/27558
- http://secunia.com/advisories/27685
- http://secunia.com/advisories/27689
- http://secunia.com/advisories/27733
- http://secunia.com/advisories/27740
- http://secunia.com/advisories/27965
- http://secunia.com/advisories/28413
- http://secunia.com/advisories/28825
- http://secunia.com/advisories/29785
- http://www.securityfocus.com/bid/26378
- http://www.securitytracker.com/id?1018918
- http://www.novell.com/linux/security/advisories/2007_25_sr.html
- http://www.ubuntu.com/usn/usn-564-1
- http://www.vupen.com/english/advisories/2007/3802
- http://www.vupen.com/english/advisories/2008/1234/references
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:225
- http://www.redhat.com/support/errata/RHSA-2007-1045.html
CVSS Scores
version 3.1