中危 Net-SNMP 5.1.4/5.2.4/5.4.1 Perl Module - 缓冲区溢出 (PoC)

CVE编号

CVE-2008-2292

利用情况

POC 已公开

补丁情况

没有补丁

披露时间

2008-05-19
漏洞描述
在Netx SNMP 5.1.4,5.2.4和5.4.1中的snmp_get中的__snprint_value函数中的缓冲区溢出(如用于Perl的SNMP.xs中)允许远程攻击者通过 attribute value pair (AVP)的大型OCTETSTRING导致拒绝服务(崩溃)并可能执行任意操作代码。

解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html
http://secunia.com/advisories/30187
http://secunia.com/advisories/30615
http://secunia.com/advisories/30647
http://secunia.com/advisories/31155
http://secunia.com/advisories/31334
http://secunia.com/advisories/31351
http://secunia.com/advisories/31467
http://secunia.com/advisories/31568
http://secunia.com/advisories/32664
http://secunia.com/advisories/33003
http://security.gentoo.org/glsa/glsa-200808-02.xml
http://sourceforge.net/tracker/index.php?func=detail&aid=1826174&group_id=126...
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239785-1
http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm
http://www.debian.org/security/2008/dsa-1663
http://www.mandriva.com/security/advisories?name=MDVSA-2008:118
http://www.redhat.com/support/errata/RHSA-2008-0529.html
http://www.securityfocus.com/bid/29212
http://www.securitytracker.com/id?1020527
http://www.ubuntu.com/usn/usn-685-1
http://www.vmware.com/security/advisories/VMSA-2008-0013.html
http://www.vupen.com/english/advisories/2008/1528/references
http://www.vupen.com/english/advisories/2008/2141/references
http://www.vupen.com/english/advisories/2008/2361
https://exchange.xforce.ibmcloud.com/vulnerabilities/42430
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 net-snmp net-snmp 5.1.4 -
运行在以下环境
应用 net-snmp net-snmp 5.2.4 -
运行在以下环境
应用 net-snmp net-snmp 5.4.1 -
运行在以下环境
系统 centos_5 net-snmp-devel * Up to
(excluding)
5.3.1-24.el5_2.1
运行在以下环境
系统 debian_10 net-snmp * Up to
(excluding)
5.4.1~dfsg-8
运行在以下环境
系统 debian_11 net-snmp * Up to
(excluding)
5.4.1~dfsg-8
运行在以下环境
系统 debian_12 net-snmp * Up to
(excluding)
5.4.1~dfsg-8
运行在以下环境
系统 debian_4.0 net-snmp * Up to
(excluding)
5.2.3-7etch4
运行在以下环境
系统 debian_5.0 net-snmp * Up to
(excluding)
5.4.1~dfsg-7+lenny1
运行在以下环境
系统 opensuse_10.2 net-snmp * Up to
(excluding)
5.4.rc2-8
运行在以下环境
系统 opensuse_10.3 net-snmp * Up to
(excluding)
5.4.1-19.2
运行在以下环境
系统 opensuse_11.0 net-snmp * Up to
(excluding)
5.4.1-77.2
运行在以下环境
系统 oracle_5 oraclelinux-release * Up to
(excluding)
5.3.1-24.el5_2.1
运行在以下环境
系统 redhat_5 net-snmp * Up to
(excluding)
0:5.1.2-11.el4_6.11.3
运行在以下环境
系统 suse_10 net-snmp-devel-64bit * Up to
(excluding)
5.3.0.1-25.26
阿里云评分
5.5
  • 攻击路径
    本地
  • 攻击复杂度
    复杂
  • 权限要求
    无需权限
  • 影响范围
    全局影响
  • EXP成熟度
    POC 已公开
  • 补丁情况
    没有补丁
  • 数据保密性
    无影响
  • 数据完整性
    无影响
  • 服务器危害
    N/A
  • 全网数量
    N/A
CWE-ID 漏洞类型
CWE-119 内存缓冲区边界内操作的限制不恰当
阿里云安全产品覆盖情况