Net-SNMP 5.0.x prior to 5.0.10.2, 5.2.x prior to 5.2.1.2, and 5.1.3, when net-snmp is using stream sockets such as TCP, allows remote malicious users to cause a denial of service (daemon hang and CPU consumption) via a TCP packet of length 1, which triggers an infinite loop.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
net-snmp net-snmp 5.0.2 |
||
net-snmp net-snmp 5.0.3 |
||
net-snmp net-snmp 5.2 |
||
net-snmp net-snmp 5.2.1 |
||
net-snmp net-snmp 5.0.4_pre2 |
||
net-snmp net-snmp 5.0.5 |
||
net-snmp net-snmp 5.0.6 |
||
net-snmp net-snmp 5.0.1 |
||
net-snmp net-snmp 5.0.10 |
||
net-snmp net-snmp 5.0.9 |
||
net-snmp net-snmp 5.1.3 |
||
net-snmp net-snmp 5.0 |
||
net-snmp net-snmp 5.0.7 |
||
net-snmp net-snmp 5.0.8 |