|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2005-2177: DoS against net-snmp if using stream sockets such as TCP | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Dennis Conrad <dcon> |
| Component: | Incidents | Assignee: | Marcus Rückert <mrueckert> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P5 - None | CC: | andreas.taschner, jreuter, security-team, zpetrova |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | SLES 9 | ||
| Whiteboard: | CVE-2005-2177: CVSS v2 Base Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P) | ||
| Found By: | Other | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Bug Depends on: | |||
| Bug Blocks: | 127851 | ||
|
Description
Dennis Conrad
2005-07-13 13:29:12 UTC
Markus, how bad do you consider this issue? do we need to provide updates? Any news in this one? does anyone have a sample exploit for this? i would like to test the patch before submitting the update. I checked with the customer that initiated this bug. They have only read about the CAN and do not have anything we could use to dupe it. Has the patch been produced/tested yet ? there is no sample exploit available.... Sorry for being unfamiliar with these issues. Does the fact that there is no sample exploit available mean that we are not able to produce a fix (prepared to be slapped...) ? Marcus, please submit without testing an exploit (to finally drive this issue onward ;) Has this moved closer towards release of the fix ? CAN-2005-2177 (subjects can be changed so the number could get lost there) Ubuntu released an advisory for it. =========================================================== Ubuntu Security Notice USN-190-1 September 29, 2005 net-snmp vulnerability CAN-2005-2177 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 4.10 (Warty Warthog) Ubuntu 5.04 (Hoary Hedgehog) The following packages are affected: libsnmp5 snmpd The problem can be corrected by upgrading the affected package to version 5.1.1-2ubuntu3.1 (for Ubuntu 4.10), or 5.1.2-6ubuntu2.1 (for Ubuntu 5.04). In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: A remote Denial of Service has been discovered in the SMNP (Simple Network Management Protocol) library. If a SNMP agent uses TCP sockets for communication, a malicious SNMP server could exploit this to crash the agent. Please note that by default SNMP uses UDP sockets. Updated packages for Ubuntu 4.10 (Warty Warthog): Source archives: http://security.ubuntu.com/ubuntu/pool/main/n/net-snmp/net-snmp_5.1.1-2ubuntu3.1.diff.gz Size/MD5: 64878 d6c0be6b1f4910491e5ab25445bb4700 etc. fixed packages finally released. CVE-2005-2177: CVSS v2 Base Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P) |