CVE-2008-6123: not fixed in latest security releases
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
net-snmp (Fedora) |
Fix Released
|
Medium
|
|||
net-snmp (Gentoo Linux) |
Fix Released
|
Low
|
|||
net-snmp (Ubuntu) |
Fix Released
|
Medium
|
Unassigned | ||
Dapper |
Invalid
|
Undecided
|
Stephan Rügamer | ||
Gutsy |
Invalid
|
Undecided
|
Stephan Rügamer | ||
Hardy |
Invalid
|
Undecided
|
Stephan Rügamer | ||
Intrepid |
Invalid
|
Undecided
|
Stephan Rügamer | ||
Jaunty |
Invalid
|
Undecided
|
Stephan Rügamer | ||
Karmic |
Invalid
|
Undecided
|
Unassigned | ||
Lucid |
Fix Released
|
Medium
|
Unassigned | ||
Maverick |
Fix Released
|
Medium
|
Unassigned |
Bug Description
Dear Colleagues,
it looks like that CVE-2008-6123 is not being fixed in latest security fixes for net-snmp.
From Mitre about this issue:
The netsnmp_udp_fmtaddr function (snmplib/
References:
http://
http://
https:/
Regards,
\sh
CVE References
Changed in net-snmp: | |
status: | Unknown → Confirmed |
status: | Unknown → Confirmed |
Changed in net-snmp: | |
status: | New → Confirmed |
status: | New → Confirmed |
status: | New → In Progress |
status: | New → In Progress |
assignee: | nobody → shermann |
assignee: | nobody → shermann |
Changed in net-snmp (Gentoo Linux): | |
status: | Confirmed → In Progress |
Changed in net-snmp (Gentoo Linux): | |
status: | In Progress → Fix Released |
Changed in net-snmp (Ubuntu Lucid): | |
importance: | Undecided → Medium |
Changed in net-snmp (Ubuntu Lucid): | |
status: | Triaged → Fix Committed |
Changed in net-snmp (Ubuntu Lucid): | |
status: | Fix Committed → Fix Released |
Changed in net-snmp (Gentoo Linux): | |
importance: | Unknown → Low |
Changed in net-snmp (Fedora): | |
importance: | Unknown → Medium |
status: | Confirmed → Fix Released |
A possibility of sensitive host information disclosure was found in the
implementation of SNMP protocol as defined in RFC 1065, RFC 1066, and RFC 1067.
If the snmpd deamon was running on the host, it served the SNMP queries
regardless of the fact, the IP address of the requester was not mentioned in
the list of hosts allowed to issue / request SNMP MIB objects information.
Remote attacker could use this flaw to gain host related sensitive information
via performing a SNMP query.
References: bugs.gentoo. org/show_ bug.cgi? id=250429
http://
Upstream patch: net-snmp. svn.sourceforge .net/viewvc/ net-snmp? view=rev& revision= 17367
http://