Bug 1205150 - (CVE-2022-44792) VUL-0: CVE-2022-44792: net-snmp,net-snmp-openssl1: remote attacker with write access can cause a NULL pointer dereference in handle_ipDefaultTTL()
(CVE-2022-44792)
VUL-0: CVE-2022-44792: net-snmp,net-snmp-openssl1: remote attacker with write...
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Normal
: ---
Assigned To: Alexander Bergmann
Security Team bot
https://smash.suse.de/issue/347289/
CVSSv3.1:SUSE:CVE-2022-44792:6.5:(AV:...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2022-11-07 15:19 UTC by Carlos López
Modified: 2023-01-16 08:13 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Carlos López 2022-11-07 15:19:38 UTC
CVE-2022-44792

handle_ipDefaultTTL in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.8
through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote
attacker (who has write access) to cause the instance to crash via a crafted UDP
packet, resulting in Denial of Service.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-44792
https://www.cve.org/CVERecord?id=CVE-2022-44792
https://github.com/net-snmp/net-snmp/issues/474
https://gist.github.com/menglong2234/b7bc13ae1a144f47cc3c95a7ea062428
Comment 1 Carlos López 2022-11-07 15:21:06 UTC
Affected:
- SUSE:SLE-12-SP1:Update/net-snmp
- SUSE:SLE-12-SP4:Update/net-snmp
- SUSE:SLE-15:Update/net-snmp
- SUSE:SLE-15-SP1:Update/net-snmp
- SUSE:SLE-15-SP3:Update/net-snmp
Comment 2 Alexander Bergmann 2022-11-29 16:14:51 UTC
net-snmp upstream is still working on a proper solution. Waiting for details.

This issue will be fixed together with bsc#1205148 / CVE-2022-44793.
Comment 5 Swamp Workflow Management 2023-01-11 14:23:16 UTC
SUSE-SU-2023:0068-1: An update that solves two vulnerabilities and has one errata is now available.

Category: security (moderate)
Bug References: 1198059,1205148,1205150
CVE References: CVE-2022-44792,CVE-2022-44793
JIRA References: 
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP5 (src):    net-snmp-5.7.3-11.6.1
SUSE Linux Enterprise Server 12-SP5 (src):    net-snmp-5.7.3-11.6.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 6 Swamp Workflow Management 2023-01-12 11:26:52 UTC
SUSE-SU-2023:0075-1: An update that solves two vulnerabilities and has two fixes is now available.

Category: security (moderate)
Bug References: 1205148,1205150,1206044,1206828
CVE References: CVE-2022-44792,CVE-2022-44793
JIRA References: 
Sources used:
openSUSE Leap Micro 5.3 (src):    net-snmp-5.9.3-150300.15.8.1
openSUSE Leap 15.4 (src):    net-snmp-5.9.3-150300.15.8.1
SUSE Linux Enterprise Realtime Extension 15-SP3 (src):    net-snmp-5.9.3-150300.15.8.1
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP4 (src):    net-snmp-5.9.3-150300.15.8.1
SUSE Linux Enterprise Module for Basesystem 15-SP4 (src):    net-snmp-5.9.3-150300.15.8.1
SUSE Linux Enterprise Micro 5.3 (src):    net-snmp-5.9.3-150300.15.8.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 7 Alexander Bergmann 2023-01-16 08:13:20 UTC
Fixed and released.