NA

CVE-2022-24808

Published: 16/04/2024 Updated: 17/04/2024

Vulnerability Summary

net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can use a malformed OID in a `SET` request to `NET-SNMP-AGENT-MIB::nsLogTable` to cause a NULL pointer dereference. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.

Vendor Advisories

Debian Bug report logs - #1016139 net-snmp: CVE-2022-24810 CVE-2022-24809 CVE-2022-24808 CVE-2022-24807 CVE-2022-24806 CVE-2022-24805 Package: src:net-snmp; Maintainer for src:net-snmp is Debian SNMP Team <team+snmp@trackerdebianorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Wed, 27 Jul 2022 20:57:04 U ...
Yu Zhang and Nanyu Zhong discovered several vulnerabilities in net-snmp, a suite of Simple Network Management Protocol applications, which could result in denial of service or the execution of arbitrary code For the stable distribution (bullseye), these problems have been fixed in version 59+dfsg-4+deb11u1 We recommend that you upgrade your net- ...
A flaw was found in net-snmp A buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause an out-of-bounds memory access issue (CVE-2022-24805) A flaw was found in net-snmp This issue occurs due to improper input validation when simultaneously setting malformed OIDs in the master agent and subagent (CVE-2022-24806) A flaw was f ...