Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-2292

Опубликовано: 18 мая 2008
Источник: ubuntu
Приоритет: low
EPSS Средний
CVSS2: 6.8

Описание

Buffer overflow in the __snprint_value function in snmp_get in Net-SNMP 5.1.4, 5.2.4, and 5.4.1, as used in SNMP.xs for Perl, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large OCTETSTRING in an attribute value pair (AVP).

РелизСтатусПримечание
dapper

released

5.2.1.2-4ubuntu2.3
devel

not-affected

feisty

ignored

end of life, was needed
gutsy

released

5.3.1-6ubuntu2.2
hardy

released

5.4.1~dfsg-4ubuntu4.2
intrepid

not-affected

upstream

needs-triage

Показывать по

EPSS

Процентиль: 95%
0.19084
Средний

6.8 Medium

CVSS2

Связанные уязвимости

redhat
почти 18 лет назад

Buffer overflow in the __snprint_value function in snmp_get in Net-SNMP 5.1.4, 5.2.4, and 5.4.1, as used in SNMP.xs for Perl, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large OCTETSTRING in an attribute value pair (AVP).

nvd
больше 17 лет назад

Buffer overflow in the __snprint_value function in snmp_get in Net-SNMP 5.1.4, 5.2.4, and 5.4.1, as used in SNMP.xs for Perl, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large OCTETSTRING in an attribute value pair (AVP).

debian
больше 17 лет назад

Buffer overflow in the __snprint_value function in snmp_get in Net-SNM ...

github
больше 3 лет назад

Buffer overflow in the __snprint_value function in snmp_get in Net-SNMP 5.1.4, 5.2.4, and 5.4.1, as used in SNMP.xs for Perl, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large OCTETSTRING in an attribute value pair (AVP).

oracle-oval
больше 17 лет назад

ELSA-2008-0529: net-snmp security update (MODERATE)

EPSS

Процентиль: 95%
0.19084
Средний

6.8 Medium

CVSS2