Hide Forgot
An array index error, leading to out-of heap-based buffer read flaw was found in the way net-snmp agent performed entries lookup in the extension table. When certain MIB subtree was handled by the extend directive, a remote attacker having read privilege to the subtree could use this flaw to cause a denial of service (snmpd crash) via SNMP GET request involving a non-existent extension table entry.
This issue affects the versions of the net-snmp package, as shipped with Red Hat Enterprise Linux 5 and 6. -- This issue affects the versions of the net-snmp package, as shipped with Fedora release of 15 and 16. Please schedule an update.
CVE request: [1] http://www.openwall.com/lists/oss-security/2012/04/26/2
Created net-snmp tracking bugs for this issue Affects: fedora-all [bug 816549]
Created attachment 580443 [details] simple fix
Added CVE as per http://www.openwall.com/lists/oss-security/2012/04/26/2
Hi-ho, upstream here. This is in our tracker as https://sourceforge.net/tracker/index.php?func=detail&aid=3526549&group_id=12694&atid=112694, and we've applied the suggested fix in all supported lines (5.4-trunk).
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2012:0876 https://rhn.redhat.com/errata/RHSA-2012-0876.html
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2013:0124 https://rhn.redhat.com/errata/RHSA-2013-0124.html
Statement: (none)