[CVE-2008-2292] Buffer overflow in __snprint_value() in snmp_get
Bug #241892 reported by
Till Ulen
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
net-snmp (Ubuntu) |
Fix Released
|
Undecided
|
Kees Cook |
Bug Description
CVE-2008-2292 description:
"Buffer overflow in the __snprint_value function in snmp_get in Net-SNMP 5.1.4, 5.2.4, and 5.4.1, as used in SNMP.xs for Perl, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large OCTETSTRING in an attribute value pair (AVP)."
CVE References
description: | updated |
Changed in net-snmp: | |
status: | New → Confirmed |
Changed in net-snmp: | |
status: | Confirmed → In Progress |
To post a comment you must log in.
Attaching debdiff