Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2007-5846 |
CWE-ID | CWE-400 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Net-snmp Server applications / Remote management servers, RDP, SSH |
Vendor | net-snmp.sourceforge.net |
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU49578
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2007-5846
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to the SNMP agent (snmp_agent.c) in net-snmp does not properly control consumption of internal resources. A remote attacker can trigger resource exhaustion by sending a GETBULK request with a large max-repeaters value and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Vulnerable software versionsNet-snmp: 5.0.1 - 5.3.4.pre2
http://bugs.gentoo.org/show_bug.cgi?id=198346
http://lists.vmware.com/pipermail/security-announce/2008/000014.html
http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/tags/Ext-5-4-1/net-snmp/agent/snmp_agent.c?view=log
http://osvdb.org/38904
http://security.gentoo.org/glsa/glsa-200711-31.xml
http://sourceforge.net/project/shownotes.php?release_id=528095&group_id=12694
http://sourceforge.net/tracker/index.php?func=detail&aid=1712988&group_id=12694&atid=112694
http://www.debian.org/security/2008/dsa-1483
http://www.mandriva.com/security/advisories?name=MDKSA-2007:225
http://www.novell.com/linux/security/advisories/2007_25_sr.html
http://www.redhat.com/support/errata/RHSA-2007-1045.html
http://www.securityfocus.com/archive/1/490917/100/0/threaded
http://www.securityfocus.com/bid/26378
http://www.securitytracker.com/id?1018918
http://www.ubuntu.com/usn/usn-564-1
http://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730
http://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11258
http://www.redhat.com/archives/fedora-package-announce/2007-November/msg00613.html
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?