Improper Privilege Management Affecting net-snmp package, versions <5.8+dfsg-4
Threat Intelligence
EPSS
0.05% (15th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-NETSNMP-596932
- published 30 Jul 2020
- disclosed 20 Aug 2020
Introduced: 30 Jul 2020
CVE-2020-15862 Open this link in a new tabHow to fix?
Upgrade Debian:unstable net-snmp to version 5.8+dfsg-4 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream net-snmp package and not the net-snmp package as distributed by Debian.
See How to fix? for Debian:unstable relevant fixed versions and status.
Net-SNMP through 5.8 has Improper Privilege Management because SNMP WRITE access to the EXTEND MIB provides the ability to run arbitrary commands as root.
References
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2020-15862
- https://security-tracker.debian.org/tracker/CVE-2020-15862
- https://github.com/net-snmp/net-snmp/commit/77f6c60f57dba0aaea5d8ef1dd94bcd0c8e6d205
- https://salsa.debian.org/debian/net-snmp/-/commit/fad8725402752746daf0a751dcff19eb6aeab52e
- https://security.netapp.com/advisory/ntap-20200904-0001/
- https://security.gentoo.org/glsa/202008-12
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=965166
- https://usn.ubuntu.com/4471-1/
CVSS Scores
version 3.1