Description
net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a user with read-write credentials can use a malformed OID in a `SET` request to `NET-SNMP-AGENT-MIB::nsLogTable` to cause a NULL pointer dereference. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.
References (8)
Core 8
Core References
Third Party Advisory
https://security.gentoo.org/glsa/202210-29
Third Party Advisory
https://www.debian.org/security/2022/dsa-5209
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2103225
Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=2105240
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/08/msg00020.html
Scores
CVSS v3
6.5
EPSS
0.0019
EPSS Percentile
41.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-476
Status
published
Products (23)
debian/debian_linux
10.0
debian/debian_linux
11.0
fedoraproject/fedora
36
net-snmp/net-snmp
< 5.9.2
redhat/enterprise_linux
9.0
redhat/enterprise_linux_eus
9.2
redhat/enterprise_linux_eus
9.4
redhat/enterprise_linux_for_arm_64
9.0
redhat/enterprise_linux_for_arm_64
9.2_aarch64
redhat/enterprise_linux_for_arm_64
9.4_aarch64
... and 13 more
Published
Apr 16, 2024
Tracked Since
Feb 18, 2026