Arch Linux

Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines

Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.

REPEAT: Do NOT report bugs for outdated packages!
Tasklist

FS#7086 - Warning on net-snmp

Attached to Project: Arch Linux
Opened by DaNiMoTh (DaNiMoTh) - Monday, 07 May 2007, 09:15 GMT
Last edited by Jan de Groot (JGC) - Tuesday, 05 June 2007, 09:27 GMT
Task Type Bug Report
Category Security
Status Closed
Assigned To Dale Blount (dale)
Architecture All
Severity High
Priority Normal
Reported Version 0.8 Voodoo
Due in Version Undecided
Due Date Undecided
Percent Complete 100%
Votes 0
Private No

Details

------------------------------------------------------------
Arch Linux Security Warning ALSW 2007-#27
------------------------------------------------------------

Name: net-snmp
Date: 2007-05-07
Severity: High
Warning #: 2007-#27

------------------------------------------------------------

Product Background
===================
Simple Network Management Protocol (SNMP) is a widely used protocol for monitoring the health and welfare of network equipment (eg. routers), computer equipment and even devices like UPSs. Net-SNMP is a suite of applications used to implement SNMP v1, SNMP v2c and SNMP v3 using both IPv4 and IPv6.

Problem Background - Impact
===================
snmp_api.c in snmpd in Net-SNMP 5.2.x before 5.2.2, 5.1.x before 5.1.3, and 5.0.x before 5.0.10.2, when running in master agentx mode, allows remote attackers to cause a denial of service (crash) by causing a particular TCP disconnect, which triggers a free of an incorrect variable, a different vulnerability than CVE-2005-2177.


Problem Packages
===================
Package: net-snmp
Repo: current
Group: network
Unsafe: < 5.2.2
Safe: >= 5.2.2

Package Fix
===================
The 5.2.2 version resolves the problem. On the official site is reported a new 5.2.4 version, other than 5.4.x and 5.3.x, that has this issue corrected.

===================

Unofficial ArchLinux Security Bug Tracker:
http://jjdanimoth.netsons.org/alsw.html

Reference(s)
===================
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4837
This task depends upon

Closed by  Jan de Groot (JGC)
Tuesday, 05 June 2007, 09:27 GMT
Reason for closing:  Fixed

Loading...