This text comes from this message: http://sourceforge.net/mailarchive/forum.php?thread_id=7659656&forum_id=12455 From: Wes Hardaker A security vulnerability has been found in Net-SNMP releases that could allow a denial of service attack against Net-SNMP agent"s which have opened a stream based protocol (EG, TCP but not UDP; it should be noted that Net-SNMP does not by default open a TCP port). Because of this, we"ve immediately released a number of Net-SNMP versions (5.2.1.2, 5.1.3, and 5.0.10.2) to fix this problem in the various Net-SNMP branches. Most of these versions are minor patches from a previous release, but since we were so close to releasing 5.1.3 anyway we decided to do a full release of that rather than an incremental release from the 5.1.2 release.
This issue may also affect RHEL3
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2005-373.html