Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 218065 - Buffer overflow when polling SNMP IP Address
Buffer overflow when polling SNMP IP Address
Product: Fedora
Classification: Fedora
Component: zabbix (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Jarod Wilson
Fedora Extras Quality Assurance
Depends On:
  Show dependency treegraph
Reported: 2006-12-01 12:25 EST by Jeffrey C. Ollie
Modified: 2007-11-30 17:11 EST (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2006-12-13 15:45:47 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)
Fix for buffer overflow. (309 bytes, patch)
2006-12-01 12:25 EST, Jeffrey C. Ollie
no flags Details | Diff

  None (edit)
Description Jeffrey C. Ollie 2006-12-01 12:25:22 EST
Description of problem:
The zabbix server crashes when you try and poll a SNMP OID that returns an IP
address.  In my case I am polling
"ip.ipRouteTable.ipRouteEntry.ipRouteNextHop.".  It looks like the buffer
allocated for converting a numeric IP address into a string is too small and the
gcc buffer overflow protection code detects that and kills the server.

Version-Release number of selected component (if applicable):


How reproducible:

Steps to Reproduce:
1. Set up a new item in Zabbix to poll a SNMP OID that returns an IP address.
Actual results:
Zabbix server crashes.

Expected results:
Data gets entered into database.

Additional info:
Patch attached.
Comment 1 Jeffrey C. Ollie 2006-12-01 12:25:22 EST
Created attachment 142585 [details]
Fix for buffer overflow.
Comment 3 Jarod Wilson 2006-12-13 15:45:47 EST
Patch included in zabbix-1.1.4-4, now building for devel, fc6 and fc5. I'll drop
a line to upstream about it...

Note You need to log in before you can comment on or make changes to this bug.