Source: net-snmp
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerabilities were published for net-snmp.

5.9.3 fixes the following issues:

- These two CVEs can be exploited by a user with read-only credentials:
    - CVE-2022-24805 A buffer overflow in the handling of the INDEX of
      NET-SNMP-VACM-MIB can cause an out-of-bounds memory access.
    - CVE-2022-24809 A malformed OID in a GET-NEXT to the nsVacmAccessTable
      can cause a NULL pointer dereference.
    - These CVEs can be exploited by a user with read-write credentials:
        - CVE-2022-24806 Improper Input Validation when SETing malformed
          OIDs in master agent and subagent simultaneously
        - CVE-2022-24807 A malformed OID in a SET request to
          SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable can cause an
          out-of-bounds memory access.
        - CVE-2022-24808 A malformed OID in a SET request to
          NET-SNMP-AGENT-MIB::nsLogTable can cause a NULL pointer dereference
        - CVE-2022-24810 A malformed OID in a SET to the nsVacmAccessTable
          can cause a NULL pointer dereference.
   - To avoid these flaws, use strong SNMPv3 credentials and do not share them.
     If you must use SNMPv1 or SNMPv2c, use a complex community string
     and enhance the protection by restricting access to a given IP address 
range.
   - Thanks are due to Yu Zhang of VARAS@IIE and Nanyu Zhong of VARAS@IIE for
     reporting the following CVEs that have been fixed in this release, and
     to Arista Networks for providing fixes.

Please adjust the affected versions in the BTS as needed.

Reply via email to