Bug 447262 (CVE-2008-2292) - CVE-2008-2292 net-snmp: buffer overflow in perl module's Perl Module __snprint_value()
Summary: CVE-2008-2292 net-snmp: buffer overflow in perl module's Perl Module __snprin...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2008-2292
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL: http://nvd.nist.gov/nvd.cfm?cvename=C...
Whiteboard:
Depends On: 449894 449895 449896 449897 449898 449899
Blocks:
TreeView+ depends on / blocked
 
Reported: 2008-05-19 07:06 UTC by Tomas Hoger
Modified: 2019-09-29 12:24 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2008-11-13 15:41:24 UTC
Embargoed:


Attachments (Terms of Use)
Nico's patch for both Perl and Python modules issues (6.74 KB, patch)
2008-05-26 13:30 UTC, Tomas Hoger
no flags Details | Diff


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2008:0529 0 normal SHIPPED_LIVE Moderate: net-snmp security update 2008-06-10 14:09:13 UTC

Description Tomas Hoger 2008-05-19 07:06:50 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2008-2292 to the following vulnerability:

Buffer overflow in the __snprint_value function in snmp_get in
Net-SNMP 5.1.4, 5.2.4, and 5.4.1, as used in SNMP.xs for Perl, allows
remote attackers to cause a denial of service (crash) and possibly
execute arbitrary code via a large OCTETSTRING in an attribute value
pair (AVP).

Upstream bug report:
http://sourceforge.net/tracker/index.php?func=detail&aid=1826174&group_id=12694&atid=112694

Upstream patch:
http://net-snmp.svn.sourceforge.net/viewvc/net-snmp?view=rev&sortby=date&revision=16770

Fixed upstream in: 5.4.2.pre1.

Other references:
http://secunia.com/advisories/30187
http://xforce.iss.net/xforce/xfdb/42430
http://www.frsirt.com/english/advisories/2008/1528
http://www.securityfocus.com/bid/29212

Comment 1 Tomas Hoger 2008-05-26 13:30:00 UTC
According to Nico Golde's posting to oss-security, same issue affects python
module (affected file - python/netsnmp/client_intf.c):

  http://www.openwall.com/lists/oss-security/2008/05/24/1


Comment 2 Tomas Hoger 2008-05-26 13:30:48 UTC
Created attachment 306675 [details]
Nico's patch for both Perl and Python modules issues

Comment 3 Tomas Hoger 2008-05-27 08:28:15 UTC
net-snmp packages in Red Hat Enterprise Linux and Fedora do not ship python
net-snmp bindings, only perl bindings.

Comment 7 Fedora Update System 2008-06-11 04:39:22 UTC
net-snmp-5.4.1-18.fc9 has been pushed to the Fedora 9 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 8 Fedora Update System 2008-06-11 04:39:32 UTC
net-snmp-5.4.1-7.fc8 has been pushed to the Fedora 8 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 9 Fedora Update System 2008-06-11 04:39:50 UTC
net-snmp-5.4-18.fc7 has been pushed to the Fedora 7 stable repository.  If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.