CPANSA-Net-SNMP-2014-2285: Net-SNMP vulnerability
Publisher | giterlizzi | Document category | csaf_security_advisory |
---|---|---|---|
Initial release date | 2014-04-27T00:00:00 | Engine | CSAF Perl Toolkit 0.25 |
Current release date | 2014-04-27T00:00:00 | Build Date | |
Current version | 1 | Status | final |
CVSS v3.1 Base Score | Severity | ||
Original language | Language | en | |
Also referred to |
Vulnerability Description
The perl_trapd_handler function in perl/TrapReceiver/TrapReceiver.xs in Net-SNMP 5.7.3.pre3 and earlier, when using certain Perl versions, allows remote attackers to cause a denial of service (snmptrapd crash) via an empty community string in an SNMP trap, which triggers a NULL pointer dereference within the newSVpv function in Perl.
Vulnerabilities
CVE-2014-2285
Vulnerability DescriptionThe perl_trapd_handler function in perl/TrapReceiver/TrapReceiver.xs in Net-SNMP 5.7.3.pre3 and earlier, when using certain Perl versions, allows remote attackers to cause a denial of service (snmptrapd crash) via an empty community string in an SNMP trap, which triggers a NULL pointer dereference within the newSVpv function in Perl.
Weakness | CWE-20 : Improper Input Validation |
---|
Product status
Known affected
Product | Score | ||||||||
---|---|---|---|---|---|---|---|---|---|
Net-SNMP less than or equal 5.7.3 |
|
giterlizzi
Namespace: https://github.com/giterlizzi/
gdt@cpan.org
References
- CPANSA-Net-SNMP-2014-2285 JSON self
https://raw.githubusercontent.com/giterlizzi/perl-CPANSA-CSAF/develop/csaf/white/2014/cpansa-net-snmp-2014-2285.json - http://lists.opensuse.org/opensuse-updates/2014-03/msg00060.html external
http://lists.opensuse.org/opensuse-updates/2014-03/msg00060.html - http://comments.gmane.org/gmane.comp.security.oss.general/12284 external
http://comments.gmane.org/gmane.comp.security.oss.general/12284 - https://bugzilla.redhat.com/show_bug.cgi?id=1072778 external
https://bugzilla.redhat.com/show_bug.cgi?id=1072778 - http://sourceforge.net/p/net-snmp/patches/1275/ external
http://sourceforge.net/p/net-snmp/patches/1275/ - http://www.nntp.perl.org/group/perl.perl5.porters/2006/09/msg116250.html external
http://www.nntp.perl.org/group/perl.perl5.porters/2006/09/msg116250.html - https://bugzilla.redhat.com/show_bug.cgi?id=1072044 external
https://bugzilla.redhat.com/show_bug.cgi?id=1072044 - http://lists.opensuse.org/opensuse-updates/2014-03/msg00061.html external
http://lists.opensuse.org/opensuse-updates/2014-03/msg00061.html - http://secunia.com/advisories/59974 external
http://secunia.com/advisories/59974 - http://www.gentoo.org/security/en/glsa/glsa-201409-02.xml external
http://www.gentoo.org/security/en/glsa/glsa-201409-02.xml - https://rhn.redhat.com/errata/RHSA-2014-0322.html external
https://rhn.redhat.com/errata/RHSA-2014-0322.html - http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 external
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 - CVE-2014-2285 (NVD) external
https://nvd.nist.gov/vuln/detail/CVE-2014-2285
Revision history
Version | Date of the revision | Summary of the revision |
---|---|---|
1 | Sun Apr 27 00:00:00 2014 | First release |
Sharing rules
TLP:WHITE
For the TLP version see: https://www.first.org/tlp/