Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 222265 - net-analyzer/net-snmp <5.4.1-r4 Perl Module "__snprint_value()" Buffer Overflow (CVE-2008-2292)
Summary: net-analyzer/net-snmp <5.4.1-r4 Perl Module "__snprint_value()" Buffer Overfl...
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://secunia.com/advisories/30187/
Whiteboard: B2 [glsa]
Keywords:
Depends on: CVE-2008-0960
Blocks:
  Show dependency tree
 
Reported: 2008-05-15 14:48 UTC by Robert Buchholz (RETIRED)
Modified: 2008-08-06 00:30 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Buchholz (RETIRED) gentoo-dev 2008-05-15 14:48:40 UTC
Secunia:
A vulnerability has been reported in Net-snmp, which potentially can be exploited by malicious people to compromise a vulnerable system.

The vulnerability is caused due to a boundary error within the "__snprint_value()" function in perl/SNMP/SNMP.xs. This can be exploited to cause a buffer overflow in an application using the Net-snmp Perl module by tricking the user into connecting to a malicious SNMP agent.

The vulnerability is reported in version 5.4.1. Other versions may also be affected.
Comment 1 Peter Volkov (RETIRED) gentoo-dev 2008-06-06 20:05:00 UTC
Thank you Robert for report. This is fixed in net-snmp-5.4.1-r4. But please, don't stabilize it now as we have one more security issue pending and I'd like to stabilize them in one go.
Comment 2 Robert Buchholz (RETIRED) gentoo-dev 2008-07-03 00:40:12 UTC
A later version including the same patch has been stabled in bug 225105.
Comment 3 Robert Buchholz (RETIRED) gentoo-dev 2008-08-06 00:30:36 UTC
GLSA 200808-02