Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 447262 - (CVE-2008-2292) CVE-2008-2292 net-snmp: buffer overflow in perl module's Perl Module __snprint_value()
CVE-2008-2292 net-snmp: buffer overflow in perl module's Perl Module __snprin...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
http://nvd.nist.gov/nvd.cfm?cvename=C...
source=gentoo,reported=20080515,publi...
: Security
Depends On: 449894 449895 449896 449897 449898 449899
Blocks:
  Show dependency treegraph
 
Reported: 2008-05-19 03:06 EDT by Tomas Hoger
Modified: 2008-11-13 10:41 EST (History)
2 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2008-11-13 10:41:24 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
Nico's patch for both Perl and Python modules issues (6.74 KB, patch)
2008-05-26 09:30 EDT, Tomas Hoger
no flags Details | Diff


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2008:0529 normal SHIPPED_LIVE Moderate: net-snmp security update 2008-06-10 10:09:13 EDT

  None (edit)
Description Tomas Hoger 2008-05-19 03:06:50 EDT
Common Vulnerabilities and Exposures assigned an identifier CVE-2008-2292 to the following vulnerability:

Buffer overflow in the __snprint_value function in snmp_get in
Net-SNMP 5.1.4, 5.2.4, and 5.4.1, as used in SNMP.xs for Perl, allows
remote attackers to cause a denial of service (crash) and possibly
execute arbitrary code via a large OCTETSTRING in an attribute value
pair (AVP).

Upstream bug report:
http://sourceforge.net/tracker/index.php?func=detail&aid=1826174&group_id=12694&atid=112694

Upstream patch:
http://net-snmp.svn.sourceforge.net/viewvc/net-snmp?view=rev&sortby=date&revision=16770

Fixed upstream in: 5.4.2.pre1.

Other references:
http://secunia.com/advisories/30187
http://xforce.iss.net/xforce/xfdb/42430
http://www.frsirt.com/english/advisories/2008/1528
http://www.securityfocus.com/bid/29212
Comment 1 Tomas Hoger 2008-05-26 09:30:00 EDT
According to Nico Golde's posting to oss-security, same issue affects python
module (affected file - python/netsnmp/client_intf.c):

  http://www.openwall.com/lists/oss-security/2008/05/24/1
Comment 2 Tomas Hoger 2008-05-26 09:30:48 EDT
Created attachment 306675 [details]
Nico's patch for both Perl and Python modules issues
Comment 3 Tomas Hoger 2008-05-27 04:28:15 EDT
net-snmp packages in Red Hat Enterprise Linux and Fedora do not ship python
net-snmp bindings, only perl bindings.
Comment 7 Fedora Update System 2008-06-11 00:39:22 EDT
net-snmp-5.4.1-18.fc9 has been pushed to the Fedora 9 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 8 Fedora Update System 2008-06-11 00:39:32 EDT
net-snmp-5.4.1-7.fc8 has been pushed to the Fedora 8 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 9 Fedora Update System 2008-06-11 00:39:50 EDT
net-snmp-5.4-18.fc7 has been pushed to the Fedora 7 stable repository.  If problems still persist, please make note of it in this bug report.

Note You need to log in before you can comment on or make changes to this bug.