Red Hat Bugzilla – Bug 162909
CAN-2005-2177 net-snmp denial of service
Last modified: 2015-03-04 20:14:53 EST
+++ This bug was initially created as a clone of Bug #162907 +++
This text comes from this message:
From: Wes Hardaker
A security vulnerability has been found in Net-SNMP releases that
could allow a denial of service attack against Net-SNMP agent"s which
have opened a stream based protocol (EG, TCP but not UDP; it should be
noted that Net-SNMP does not by default open a TCP port). Because of
this, we"ve immediately released a number of Net-SNMP versions
(220.127.116.11, 5.1.3, and 18.104.22.168) to fix this problem in the various
Net-SNMP branches. Most of these versions are minor patches from a
previous release, but since we were so close to releasing 5.1.3 anyway
we decided to do a full release of that rather than an incremental
release from the 5.1.2 release.
While this issue is for net-snmp, ucd-snmp shares much of the same code. I
don't know yet if this affects ucd-snmp.
Read ya, Phil
Reviewed the fix today and found the actual security fix.
Backported the relevant fixes back to ucd-snmp and built a package for RHEL-2.1
Please open an errata at your convenience.
Read ya, Phil
This issue is going to be RHSA-2005:720
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.