A vulnerability has been reported in Net-snmp, which potentially can be exploited by malicious people to compromise a vulnerable system.
The vulnerability is caused due to a boundary error within the "__snprint_value()" function in perl/SNMP/SNMP.xs. This can be exploited to cause a buffer overflow in an application using the Net-snmp Perl module by tricking the user into connecting to a malicious SNMP agent.
The vulnerability is reported in version 5.4.1. Other versions may also be affected.
Thank you Robert for report. This is fixed in net-snmp-5.4.1-r4. But please, don't stabilize it now as we have one more security issue pending and I'd like to stabilize them in one go.
A later version including the same patch has been stabled in bug 225105.