7.5
CVSSv2

CVE-2015-5621

Published: 19/08/2015 Updated: 10/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The snmp_pdu_parse function in snmp_api.c in net-snmp 5.7.2 and previous versions does not remove the varBind variable in a netsnmp_variable_list item when parsing of the SNMP PDU fails, which allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

net-snmp net-snmp

Vendor Advisories

Debian Bug report logs - #788964 net-snmp: CVE-2015-5621: snmp_pdu_parse() incompletely parsed varBinds left in list of variables Package: src:net-snmp; Maintainer for src:net-snmp is Net-SNMP Packaging Team <pkg-net-snmp-devel@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Tue, 16 Ju ...
Net-SNMP could be made to crash or run programs if it received specially crafted network traffic ...
A heap corruption vulnerability was discovered in net-snmp, a suite of Simple Network Management Protocol applications, triggered when parsing the PDU prior to the authentication process A remote, unauthenticated attacker can take advantage of this flaw to crash the snmpd process (causing a denial of service) or, potentially, execute arbitrary cod ...
It was discovered that the snmp_pdu_parse() function could leave incompletely parsed varBind variables in the list of variables A remote, unauthenticated attacker could use this flaw to crash snmpd or, potentially, execute arbitrary code on the system with the privileges of the user running snmpd (CVE-2015-5621) ...
It was discovered that the snmp_pdu_parse() function could leave incompletely parsed varBind variables in the list of variables A remote, unauthenticated attacker could use this flaw to crash snmpd or, potentially, execute arbitrary code on the system with the privileges of the user running snmpd ...
It was discovered that in net-snmp before 58 the snmp_pdu_parse() function could leave incompletely parsed varBind variables in the list of variables A remote, unauthenticated attacker could use this flaw to crash snmpd or potentially execute arbitrary code on the system with the privileges of the user running snmpd ...

Exploits

_ _ / | ___ ___| |_ ___ ___ ___ _____ ___ _ / / | | -_| _|___|_ -| | | | |_|_/ |_|_|___|_| |___|_|_|_|_|_| _| |_| 2018-10-08 NET-SNMP REMOTE DOS =================== Second bug is remotely exploitable only with knowledge of the community string (in this case "public ...

Github Repositories

🐳 SNMP daemon Docker image based on Alpine Linux

⚠️ Abandoned project This project is not maintained anymore and is abandoned Feel free to fork and make your own changes if needed About 🐳 SNMP daemon (snmpd) Docker image based on Alpine Linux If you are interested, check out my other 🐳 Docker images! πŸ’‘ Want to be notified of new releases? Check out πŸ”” Diun (Docker Image Update Notifier) project! Features SN