Description
In FreeBSD 12.0-STABLE before r350637, 12.0-RELEASE before 12.0-RELEASE-p9, 11.3-STABLE before r350638, 11.3-RELEASE before 11.3-RELEASE-p2, and 11.2-RELEASE before 11.2-RELEASE-p13, the bsnmp library is not properly validating the submitted length from a type-length-value encoding. A remote user could cause an out-of-bounds read or trigger a crash of the software such as bsnmpd resulting in a denial of service.
References (4)
Core 4
Core References
Patch, Vendor Advisory vendor-advisory
x_refsource_freebsd
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:20.bsnmp.asc
Mailing List, Patch, Third Party Advisory mailing-list
x_refsource_bugtraq
https://seclists.org/bugtraq/2019/Aug/6
Patch, Third Party Advisory, VDB Entry x_refsource_misc
http://packetstormsecurity.com/files/153959/FreeBSD-Security-Advisory-FreeBSD-SA-19-20.bsnmp.html
Third Party Advisory x_refsource_confirm
https://security.netapp.com/advisory/ntap-20190910-0002/
Scores
CVSS v3
7.5
EPSS
0.0402
EPSS Percentile
88.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-125
Status
published
Products (4)
freebsd/freebsd
11.2 (13 CPE variants)
freebsd/freebsd
11.3 (5 CPE variants)
freebsd/freebsd
12.0 (6 CPE variants)
netapp/clustered_data_ontap
Published
Aug 30, 2019
Tracked Since
Feb 18, 2026