Common Vulnerabilities and Exposures assigned an identifier CVE-2008-2292 to the following vulnerability: Buffer overflow in the __snprint_value function in snmp_get in Net-SNMP 5.1.4, 5.2.4, and 5.4.1, as used in SNMP.xs for Perl, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large OCTETSTRING in an attribute value pair (AVP). Upstream bug report: http://sourceforge.net/tracker/index.php?func=detail&aid=1826174&group_id=12694&atid=112694 Upstream patch: http://net-snmp.svn.sourceforge.net/viewvc/net-snmp?view=rev&sortby=date&revision=16770 Fixed upstream in: 5.4.2.pre1. Other references: http://secunia.com/advisories/30187 http://xforce.iss.net/xforce/xfdb/42430 http://www.frsirt.com/english/advisories/2008/1528 http://www.securityfocus.com/bid/29212
According to Nico Golde's posting to oss-security, same issue affects python module (affected file - python/netsnmp/client_intf.c): http://www.openwall.com/lists/oss-security/2008/05/24/1
Created attachment 306675 [details] Nico's patch for both Perl and Python modules issues
net-snmp packages in Red Hat Enterprise Linux and Fedora do not ship python net-snmp bindings, only perl bindings.
net-snmp-5.4.1-18.fc9 has been pushed to the Fedora 9 stable repository. If problems still persist, please make note of it in this bug report.
net-snmp-5.4.1-7.fc8 has been pushed to the Fedora 8 stable repository. If problems still persist, please make note of it in this bug report.
net-snmp-5.4-18.fc7 has been pushed to the Fedora 7 stable repository. If problems still persist, please make note of it in this bug report.
This issue was addressed in: Red Hat Enterprise Linux: http://rhn.redhat.com/errata/RHSA-2008-0529.html Fedora: https://admin.fedoraproject.org/updates/F8/FEDORA-2008-5218 https://admin.fedoraproject.org/updates/F9/FEDORA-2008-5215