Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 222265

Summary: net-analyzer/net-snmp <5.4.1-r4 Perl Module "__snprint_value()" Buffer Overflow (CVE-2008-2292)
Product: Gentoo Security Reporter: Robert Buchholz (RETIRED) <rbu>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: normal CC: netmon
Priority: High    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: http://secunia.com/advisories/30187/
Whiteboard: B2 [glsa]
Package list:
Runtime testing required: ---
Bug Depends on: 225105    
Bug Blocks:    

Description Robert Buchholz (RETIRED) gentoo-dev 2008-05-15 14:48:40 UTC
Secunia:
A vulnerability has been reported in Net-snmp, which potentially can be exploited by malicious people to compromise a vulnerable system.

The vulnerability is caused due to a boundary error within the "__snprint_value()" function in perl/SNMP/SNMP.xs. This can be exploited to cause a buffer overflow in an application using the Net-snmp Perl module by tricking the user into connecting to a malicious SNMP agent.

The vulnerability is reported in version 5.4.1. Other versions may also be affected.
Comment 1 Peter Volkov (RETIRED) gentoo-dev 2008-06-06 20:05:00 UTC
Thank you Robert for report. This is fixed in net-snmp-5.4.1-r4. But please, don't stabilize it now as we have one more security issue pending and I'd like to stabilize them in one go.
Comment 2 Robert Buchholz (RETIRED) gentoo-dev 2008-07-03 00:40:12 UTC
A later version including the same patch has been stabled in bug 225105.
Comment 3 Robert Buchholz (RETIRED) gentoo-dev 2008-08-06 00:30:36 UTC
GLSA 200808-02