Red Hat Bugzilla – Bug 162909
CAN-2005-2177 net-snmp denial of service
Last modified: 2015-03-04 20:14:53 EST
+++ This bug was initially created as a clone of Bug #162907 +++ This text comes from this message: http://sourceforge.net/mailarchive/forum.php?thread_id=7659656&forum_id=12455 From: Wes Hardaker A security vulnerability has been found in Net-SNMP releases that could allow a denial of service attack against Net-SNMP agent"s which have opened a stream based protocol (EG, TCP but not UDP; it should be noted that Net-SNMP does not by default open a TCP port). Because of this, we"ve immediately released a number of Net-SNMP versions (5.2.1.2, 5.1.3, and 5.0.10.2) to fix this problem in the various Net-SNMP branches. Most of these versions are minor patches from a previous release, but since we were so close to releasing 5.1.3 anyway we decided to do a full release of that rather than an incremental release from the 5.1.2 release. While this issue is for net-snmp, ucd-snmp shares much of the same code. I don't know yet if this affects ucd-snmp.
Will investigate. Read ya, Phil
Reviewed the fix today and found the actual security fix. Backported the relevant fixes back to ucd-snmp and built a package for RHEL-2.1 Please open an errata at your convenience. Thanks, Read ya, Phil
This issue is going to be RHSA-2005:720
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2005-720.html