6.8
CVSSv2

CVE-2008-2292

Published: 18/05/2008 Updated: 29/09/2017
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 685
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in the __snprint_value function in snmp_get in Net-SNMP 5.1.4, 5.2.4, and 5.4.1, as used in SNMP.xs for Perl, allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a large OCTETSTRING in an attribute value pair (AVP).

Vulnerable Product Search on Vulmon Subscribe to Product

net-snmp net-snmp 5.1.4

net-snmp net-snmp 5.2.4

net-snmp net-snmp 5.4.1

Vendor Advisories

Debian Bug report logs - #482333 net-snmp: CVE-2008-2292 buffer overflow in __snprint_value function Package: net-snmp; Maintainer for net-snmp is Net-SNMP Packaging Team <pkg-net-snmp-devel@listsaliothdebianorg>; Reported by: Nico Golde <nion@debianorg> Date: Wed, 21 May 2008 21:45:02 UTC Severity: grave Tags: p ...
Wes Hardaker discovered that the SNMP service did not correctly validate HMAC authentication requests An unauthenticated remote attacker could send specially crafted SNMPv3 traffic with a valid username and gain access to the user’s views without a valid authentication passphrase (CVE-2008-0960) ...
Several vulnerabilities have been discovered in NET SNMP, a suite of Simple Network Management Protocol applications The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-0960 Wes Hardaker reported that the SNMPv3 HMAC verification relies on the client to specify the HMAC length, which allows spoofin ...

Exploits

#!usr/bin/perl -w ################################################################################################################ # Buffer overflow in the __snprint_value function in snmp_get in Net-SNMP 514, 524, and 541, # as used in SNMPxs for Perl, allows remote attackers to cause a denial of service (crash) and # possibly exe ...
Net-SNMP versions 514 and below, 524 and below, and 541 and below perl module buffer overflow proof of concept exploit ...

References

CWE-119http://sourceforge.net/tracker/index.php?func=detail&aid=1826174&group_id=12694&atid=112694http://www.securityfocus.com/bid/29212http://secunia.com/advisories/30187https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.htmlhttp://www.vmware.com/security/advisories/VMSA-2008-0013.htmlhttp://secunia.com/advisories/31334http://secunia.com/advisories/30647http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.htmlhttps://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.htmlhttp://secunia.com/advisories/31155http://secunia.com/advisories/31351http://security.gentoo.org/glsa/glsa-200808-02.xmlhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-239785-1http://www.mandriva.com/security/advisories?name=MDVSA-2008:118http://secunia.com/advisories/31467https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.htmlhttp://support.avaya.com/elmodocs2/security/ASA-2008-282.htmhttp://secunia.com/advisories/31568http://www.debian.org/security/2008/dsa-1663http://secunia.com/advisories/30615http://www.redhat.com/support/errata/RHSA-2008-0529.htmlhttp://secunia.com/advisories/32664http://www.ubuntu.com/usn/usn-685-1http://secunia.com/advisories/33003http://www.vupen.com/english/advisories/2008/2361http://www.vupen.com/english/advisories/2008/2141/referenceshttp://www.vupen.com/english/advisories/2008/1528/referenceshttp://www.securitytracker.com/id?1020527https://exchange.xforce.ibmcloud.com/vulnerabilities/42430https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11261https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=482333https://usn.ubuntu.com/685-1/https://nvd.nist.govhttps://www.exploit-db.com/exploits/7100/