handle_ipDefaultTTL in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.8 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker (who has write access) to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service. https://github.com/net-snmp/net-snmp/issues/474 https://gist.github.com/menglong2234/b7bc13ae1a144f47cc3c95a7ea062428
Created net-snmp tracking bugs for this issue: Affects: fedora-35 [bug 2141899] Affects: fedora-36 [bug 2141900]
Patch https://github.com/net-snmp/net-snmp/commit/be804106fd0771a7d05236cff36e199af077af57
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:2444 https://access.redhat.com/errata/RHSA-2023:2444
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:2969 https://access.redhat.com/errata/RHSA-2023:2969
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-44792