Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#7086 - Warning on net-snmp
Attached to Project:
Arch Linux
Opened by DaNiMoTh (DaNiMoTh) - Monday, 07 May 2007, 09:15 GMT
Last edited by Jan de Groot (JGC) - Tuesday, 05 June 2007, 09:27 GMT
Opened by DaNiMoTh (DaNiMoTh) - Monday, 07 May 2007, 09:15 GMT
Last edited by Jan de Groot (JGC) - Tuesday, 05 June 2007, 09:27 GMT
|
Details------------------------------------------------------------
Arch Linux Security Warning ALSW 2007-#27 ------------------------------------------------------------ Name: net-snmp Date: 2007-05-07 Severity: High Warning #: 2007-#27 ------------------------------------------------------------ Product Background =================== Simple Network Management Protocol (SNMP) is a widely used protocol for monitoring the health and welfare of network equipment (eg. routers), computer equipment and even devices like UPSs. Net-SNMP is a suite of applications used to implement SNMP v1, SNMP v2c and SNMP v3 using both IPv4 and IPv6. Problem Background - Impact =================== snmp_api.c in snmpd in Net-SNMP 5.2.x before 5.2.2, 5.1.x before 5.1.3, and 5.0.x before 5.0.10.2, when running in master agentx mode, allows remote attackers to cause a denial of service (crash) by causing a particular TCP disconnect, which triggers a free of an incorrect variable, a different vulnerability than CVE-2005-2177. Problem Packages =================== Package: net-snmp Repo: current Group: network Unsafe: < 5.2.2 Safe: >= 5.2.2 Package Fix =================== The 5.2.2 version resolves the problem. On the official site is reported a new 5.2.4 version, other than 5.4.x and 5.3.x, that has this issue corrected. =================== Unofficial ArchLinux Security Bug Tracker: http://jjdanimoth.netsons.org/alsw.html Reference(s) =================== http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4837 |
This task depends upon