Количество 11
Количество 11

CVE-2022-24805
net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a buffer overflow in the handling of the `INDEX` of `NET-SNMP-VACM-MIB` can cause an out-of-bounds memory access. A user with read-only credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.

CVE-2022-24805
net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a buffer overflow in the handling of the `INDEX` of `NET-SNMP-VACM-MIB` can cause an out-of-bounds memory access. A user with read-only credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.

CVE-2022-24805
net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a buffer overflow in the handling of the `INDEX` of `NET-SNMP-VACM-MIB` can cause an out-of-bounds memory access. A user with read-only credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.
CVE-2022-24805
net-snmp provides various tools relating to the Simple Network Managem ...

BDU:2024-06509
Уязвимость функции NET-SNMP-VACM-MIB() набора программного обеспечения Net-SNMP операционной системы Linux, позволяющая нарушителю оказывать воздействие на целостность системы

BDU:2024-06510
Уязвимость функции handle_ipDefaultTTL() набора программного обеспечения Net-SNMP операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

SUSE-SU-2022:4205-1
Security update for net-snmp

SUSE-RU-2024:0029-1
Recommended update for net-snmp

RLSA-2024:7260
Moderate: net-snmp security update
ELSA-2024-7260
ELSA-2024-7260: net-snmp security update (MODERATE)

ROS-20240815-10
Множественные уязвимости net-snmp
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2022-24805 net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a buffer overflow in the handling of the `INDEX` of `NET-SNMP-VACM-MIB` can cause an out-of-bounds memory access. A user with read-only credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range. | CVSS3: 6.5 | 0% Низкий | около 1 года назад |
![]() | CVE-2022-24805 net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a buffer overflow in the handling of the `INDEX` of `NET-SNMP-VACM-MIB` can cause an out-of-bounds memory access. A user with read-only credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range. | CVSS3: 6.7 | 0% Низкий | почти 3 года назад |
![]() | CVE-2022-24805 net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a buffer overflow in the handling of the `INDEX` of `NET-SNMP-VACM-MIB` can cause an out-of-bounds memory access. A user with read-only credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range. | CVSS3: 6.5 | 0% Низкий | около 1 года назад |
CVE-2022-24805 net-snmp provides various tools relating to the Simple Network Managem ... | CVSS3: 6.5 | 0% Низкий | около 1 года назад | |
![]() | BDU:2024-06509 Уязвимость функции NET-SNMP-VACM-MIB() набора программного обеспечения Net-SNMP операционной системы Linux, позволяющая нарушителю оказывать воздействие на целостность системы | CVSS3: 6.5 | 0% Низкий | около 1 года назад |
![]() | BDU:2024-06510 Уязвимость функции handle_ipDefaultTTL() набора программного обеспечения Net-SNMP операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 6.5 | 3% Низкий | больше 2 лет назад |
![]() | SUSE-SU-2022:4205-1 Security update for net-snmp | больше 2 лет назад | ||
![]() | SUSE-RU-2024:0029-1 Recommended update for net-snmp | больше 1 года назад | ||
![]() | RLSA-2024:7260 Moderate: net-snmp security update | 9 месяцев назад | ||
ELSA-2024-7260 ELSA-2024-7260: net-snmp security update (MODERATE) | 9 месяцев назад | |||
![]() | ROS-20240815-10 Множественные уязвимости net-snmp | CVSS3: 9.1 | 10 месяцев назад |
Уязвимостей на страницу