CVE-2008-4309

Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow, related to the number of responses or repeats.

Published : 2008-10-31 20:29 Updated : 2018-10-11 20:51

5.0
CVSS Score More info
Score 5.0 / 10
5.0
Vendor Product Version URI
Net-snmp Net-snmp 5.3.2.2 cpe:/a:net-snmp:net-snmp:5.3.2.2
Net-snmp Net-snmp 5.2.5 cpe:/a:net-snmp:net-snmp:5.2.5
Net-snmp Net-snmp 5.4 cpe:/a:net-snmp:net-snmp:5.4
  1. Net-snmp (1) Search CVE
    1. Net-snmp (3) Search CVE
      1. 5.3.2.2
      2. 5.2.5
      3. 5.4

CWE

ID Name Description Links
CWE-20 Improper Input Validation The product does not validate or incorrectly validates input that can affect the control flow or data flow of a program. CVE

References

Source Link
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/46262
BUGTRAQ http://www.securityfocus.com/archive/1/498280/100/0/threaded
APPLE http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
APPLE http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html
HP http://marc.info/?l=bugtraq&m=125017764422557&w=2
MISC http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/tags/Ext-5-2-5-1/net-snmp/agent/snmp_agent.c?r1=17271&r2=17272&pathrev=17272
GENTOO http://security.gentoo.org/glsa/glsa-200901-15.xml
CONFIRM http://sourceforge.net/forum/forum.php?forum_id=882903
SUNALERT http://sunsolve.sun.com/search/document.do?assetkey=1-26-262908-1
CONFIRM http://support.apple.com/kb/HT3549
CONFIRM http://support.apple.com/kb/HT4298
CONFIRM http://support.avaya.com/elmodocs2/security/ASA-2008-467.htm
CONFIRM http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0315
DEBIAN http://www.debian.org/security/2008/dsa-1663
MANDRIVA http://www.mandriva.com/security/advisories?name=MDVSA-2008:225
MLIST http://www.openwall.com/lists/oss-security/2008/10/31/1
REDHAT http://www.redhat.com/support/errata/RHSA-2008-0971.html
BID http://www.securityfocus.com/bid/32020
SECTRACK http://www.securitytracker.com/id?1021129
UBUNTU http://www.ubuntu.com/usn/usn-685-1
CERT http://www.us-cert.gov/cas/techalerts/TA09-133A.html
CONFIRM http://www.vmware.com/security/advisories/VMSA-2009-0001.html
VUPEN http://www.vupen.com/english/advisories/2008/2973
VUPEN http://www.vupen.com/english/advisories/2008/3400
VUPEN http://www.vupen.com/english/advisories/2009/0301
VUPEN http://www.vupen.com/english/advisories/2009/1297
VUPEN http://www.vupen.com/english/advisories/2009/1771