Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-24805

Опубликовано: 16 апр. 2024
Источник: ubuntu
Приоритет: medium
CVSS3: 6.5

Описание

net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a buffer overflow in the handling of the INDEX of NET-SNMP-VACM-MIB can cause an out-of-bounds memory access. A user with read-only credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.

РелизСтатусПримечание
bionic

released

5.7.3+dfsg-1.8ubuntu3.7
devel

released

5.9.1+dfsg-4ubuntu2
esm-infra-legacy/trusty

not-affected

5.7.2~dfsg-8.1ubuntu3.3+esm3
esm-infra/bionic

not-affected

5.7.3+dfsg-1.8ubuntu3.7
esm-infra/focal

not-affected

5.8+dfsg-2ubuntu2.4
esm-infra/xenial

released

5.7.3+dfsg-1ubuntu4.6+esm1
focal

released

5.8+dfsg-2ubuntu2.4
impish

ignored

end of life
jammy

released

5.9.1+dfsg-1ubuntu2.2
kinetic

released

5.9.1+dfsg-4ubuntu2

Показывать по

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.7
redhat
почти 3 года назад

net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a buffer overflow in the handling of the `INDEX` of `NET-SNMP-VACM-MIB` can cause an out-of-bounds memory access. A user with read-only credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.

CVSS3: 6.5
nvd
около 1 года назад

net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a buffer overflow in the handling of the `INDEX` of `NET-SNMP-VACM-MIB` can cause an out-of-bounds memory access. A user with read-only credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.

CVSS3: 6.5
debian
около 1 года назад

net-snmp provides various tools relating to the Simple Network Managem ...

CVSS3: 6.5
fstec
около 1 года назад

Уязвимость функции NET-SNMP-VACM-MIB() набора программного обеспечения Net-SNMP операционной системы Linux, позволяющая нарушителю оказывать воздействие на целостность системы

CVSS3: 6.5
fstec
больше 2 лет назад

Уязвимость функции handle_ipDefaultTTL() набора программного обеспечения Net-SNMP операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

6.5 Medium

CVSS3

Уязвимость CVE-2022-24805