Vulnerability identifier: #VU33298
Vulnerability risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-476
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Net-snmp
Server applications /
Remote management servers, RDP, SSH
Vendor: net-snmp.sourceforge.net
Description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error. A remote attacker can trigger denial of service conditions via an empty community string in an SNMP trap, which triggers a NULL pointer dereference within the newSVpv function in Perl.
Mitigation
Update to version 5.7.3.pre4.
Vulnerable software versions
Net-snmp: 5.7.3.pre3
External links
https://comments.gmane.org/gmane.comp.security.oss.general/12284
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
https://lists.opensuse.org/opensuse-updates/2014-03/msg00060.html
https://lists.opensuse.org/opensuse-updates/2014-03/msg00061.html
https://secunia.com/advisories/59974
https://sourceforge.net/p/net-snmp/patches/1275/
https://www.gentoo.org/security/en/glsa/glsa-201409-02.xml
https://www.nntp.perl.org/group/perl.perl5.porters/2006/09/msg116250.html
https://bugzilla.redhat.com/show_bug.cgi?id=1072044
https://bugzilla.redhat.com/show_bug.cgi?id=1072778
https://rhn.redhat.com/errata/RHSA-2014-0322.html
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.