Pardus Linux Security Advisory 2008-62 - The getbulk code in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via vectors related to the number of responses or repeats.
ba0220feac8ba2e8bd794b3246c5288dac98fbeee797e7d8a94eda1607ef948f
------------------------------------------------------------------------
Pardus Linux Security Advisory 2008-65 security@pardus.org.tr
------------------------------------------------------------------------
Date: 2008-11-05
Severity: 2
Type: Remote
------------------------------------------------------------------------
Summary
=======
A bug in the getbulk handling code could let anyone with even minimal
access crash the agent.
Description
===========
The getbulk code in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and
5.2 before 5.2.5.1 allows remote attackers to cause a denial of service
(crash) via vectors related to the number of responses or repeats.
Affected packages:
Pardus 2008:
net-snmp, all before 5.4.1-7-3
net-snmptrap, all before 5.4.1-7-3
Resolution
==========
There are update(s) for net-snmp, net-snmptrap. You can update them via
Package Manager or with a single command from console:
pisi up net-snmp net-snmptrap
References
==========
* http://bugs.pardus.org.tr/show_bug.cgi?id=8577
* http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-4309
------------------------------------------------------------------------
--
Pardus Security Team
http://security.pardus.org.tr