5
CVSSv2

CVE-2008-6123

Published: 12/02/2009 Updated: 12/01/2024
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The netsnmp_udp_fmtaddr function (snmplib/snmpUDPDomain.c) in net-snmp 5.0.9 up to and including 5.4.2.1, when using TCP wrappers for client authorization, does not properly parse hosts.allow rules, which allows remote malicious users to bypass intended access restrictions and execute SNMP queries, related to "source/destination IP address confusion."

Vulnerable Product Search on Vulmon Subscribe to Product

net-snmp net-snmp

opensuse opensuse 11.2

suse linux enterprise 9-11

opensuse opensuse 10.3-11.1

redhat enterprise linux 3.0

Vendor Advisories

Synopsis Moderate: net-snmp security update Type/Severity Security Advisory: Moderate Topic Updated net-snmp packages that fix a security issue are now available forRed Hat Enterprise Linux 3This update has been rated as having moderate security impact by the RedHat Security Response Team Descrip ...
Debian Bug report logs - #516801 CVE-2008-6123: Access restriction bypass Package: net-snmp; Maintainer for net-snmp is Net-SNMP Packaging Team <pkg-net-snmp-devel@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Mon, 23 Feb 2009 18:45:01 UTC Severity: grave Tags: security Fixed in ve ...
UDP clients might be able to bypass access restrictions of the SNMP server ...