Out-of-Bounds Affecting net-snmp-utils package, versions <1:5.3.1-24.el5_2.1


Severity

Recommended
0.0
medium
0
10

Based on Oracle Linux security rating.

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
17.4% (95th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ORACLE5-NETSNMPUTILS-2449448
  • published10 Apr 2022
  • disclosed18 May 2008

Introduced: 18 May 2008

CVE-2008-2292  (opens in a new tab)
CWE-119  (opens in a new tab)

How to fix?

Upgrade Oracle:5 net-snmp-utils to version 1:5.3.1-24.el5_2.1 or higher.
This issue was patched in ELSA-2008-0529.

NVD Description

Note: Versions mentioned in the description apply only to the upstream net-snmp-utils package and not the net-snmp-utils package as distributed by Oracle. See How to fix? for Oracle:5 relevant fixed versions and status.

Buffer overflow in the __snprint_value function in snmp_get in Net-SNMP 5.1.4, 5.2.4, and 5.4.1, as used in SNMP.xs for Perl, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large OCTETSTRING in an attribute value pair (AVP).

References

CVSS Base Scores

version 3.1