A remote denial-of-Service flaw was found in the way snmptrapd handled trap requests with empty community string, when the perl handler was enabled. A remote attacker could use this flaw to cause snmp to crash. More details about the flaw is available at: https://bugzilla.redhat.com/show_bug.cgi?id=1072044 Proposed upstream patch: http://sourceforge.net/p/net-snmp/patches/1275/
This issue has been assigned CVE-2014-2285 via: http://www.openwall.com/lists/oss-security/2014/03/05/9
This issue was caused by a bug in perl in the way newSVpv() handled NULL as its first argument. The perl version shipped in Red Hat Enterprise Linux 5 crashes when newSVpv() is called with NULL argument. The perl version shipped in Red Hat Enterprise Linux 6 handles NULL values gracefully, and hence net-snmp packages in Red Hat Enterprise Linux 6 are not affected by this problem. References related to the perl bug and its fix: http://www.nntp.perl.org/group/perl.perl5.porters/2006/09/msg116250.html http://perl5.git.perl.org/perl.git/commitdiff/ddfa59c Statement: This issue did not affect the versions of net-snmp as shipped with Red Hat Enterprise Linux 6.
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2014:0322 https://rhn.redhat.com/errata/RHSA-2014-0322.html