CVE-2008-0960 – SNMPv3 - HMAC Validation error Remote Authentication Bypass
https://notcve.org/view.php?id=CVE-2008-0960
SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte. Una comprobación SNMPv3 HMAC en (1) Net-SNMP versión 5.2.x anterior a 5.2.4.1, versión 5.3.x anterior a 5.3.2.1 y versión 5.4.x anterior a 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) C-series versión 1.0.0 hasta 2.0.0 de Juniper Session and Resource Control (SRC); (5) Data de NetApp (también se conoce como Network Appliance) ONTAP versiones 7.3RC1 y 7.3RC2; (6) SNMP Research versión anterior a 16.2; (7) múltiples productos Cisco IOS, CatOS, ACE y Nexus; (8) Ingate Firewall versión 3.1.0 y posterior y SIParator versión 3.1.0 y posterior; (9) HP OpenView SNMP Emanate Master Agent versión 15.x; y posiblemente otros productos dependen del cliente para especificar la longitud del HMAC, lo que facilita que los atacantes remotos omitan la autenticación SNMP por medio de un valor de longitud de 1, que solo comprueba el primer byte. • https://www.exploit-db.com/exploits/5790 http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html http://lists.ingate.com/pipermail/productinfo/2008/000021.html http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html http://marc.info/?l=bugtraq&m=127730470825399&w=2 http://rhn.redhat.com/errata/RHSA-2008-0528.html http://secunia.com/advisories/30574 http://secunia.com/advisories/30596 http://secunia.com/advisories/30612 http://secunia.c • CWE-287: Improper Authentication •
CVE-2008-2292 – Net-SNMP 5.1.4/5.2.4/5.4.1 Perl Module - Buffer Overflow (PoC)
https://notcve.org/view.php?id=CVE-2008-2292
Buffer overflow in the __snprint_value function in snmp_get in Net-SNMP 5.1.4, 5.2.4, and 5.4.1, as used in SNMP.xs for Perl, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large OCTETSTRING in an attribute value pair (AVP). Desbordamiento de búfer en la función __snprint_value de snmp_get en Net-SNMP 5.1.4, 5.2.4 y 5.4.1, como se usa en SNMP.xs para Perl, permite a atacantes remotos provocar una denegación de servicio (caída) y posiblemente ejecutar código de su elección mediante un OCTETSTRING grande en un par atributo valor (AVP). • https://www.exploit-db.com/exploits/7100 http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html http://secunia.com/advisories/30187 http://secunia.com/advisories/30615 http://secunia.com/advisories/30647 http://secunia.com/advisories/31155 http://secunia.com/advisories/31334 http://secunia.com/advisories/31351 http://secunia.com/advisories/31467 http://secunia.com/advisories/31568 http://secunia.com/advisories/32664 http://secunia.com/advisories/33003 http • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2007-5846 – net-snmp remote DoS via udp packet
https://notcve.org/view.php?id=CVE-2007-5846
The SNMP agent (snmp_agent.c) in net-snmp before 5.4.1 allows remote attackers to cause a denial of service (CPU and memory consumption) via a GETBULK request with a large max-repeaters value. El agente SNMP (snmp_agent.c) en net-snmp versiones anteriores a 5.4.1, permite a atacantes remotos causar una denegación de servicio (consumo de CPU y memoria) por medio de una petición GETBULK con un valor de max-repeaters largo. • http://bugs.gentoo.org/show_bug.cgi?id=198346 http://lists.vmware.com/pipermail/security-announce/2008/000014.html http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/tags/Ext-5-4-1/net-snmp/agent/snmp_agent.c?view=log http://osvdb.org/38904 http://secunia.com/advisories/27558 http://secunia.com/advisories/27685 http://secunia.com/advisories/27689 http://secunia.com/advisories/27733 http://secunia.com/advisories/27740 http://secunia.com/advisories/27965 http:/ • CWE-399: Resource Management Errors •
CVE-2006-6305
https://notcve.org/view.php?id=CVE-2006-6305
Unspecified vulnerability in Net-SNMP 5.3 before 5.3.0.1, when configured using the rocommunity or rouser snmpd.conf tokens, causes Net-SNMP to grant write access to users or communities that only have read-only access. Vulnerabilidad no especificada en Net-SNMP 5.3 anterior a 5.3.0.1, cuando está configurado para que use las señales (tokens) de snmpd.conf rocommunity y rouser, provoca que Net-SNMP otorgue permisos de escritura a usuarios o comunidades que solo tenían permisos de lectura. • http://net-snmp.sourceforge.net/about/ChangeLog.html http://net-snmp.sourceforge.net/about/news.html http://secunia.com/advisories/23285 http://securitytracker.com/id?1017355 http://sourceforge.net/forum/forum.php?forum_id=531399 http://www.securityfocus.com/bid/21503 https://exchange.xforce.ibmcloud.com/vulnerabilities/30782 •
CVE-2005-4837
https://notcve.org/view.php?id=CVE-2005-4837
snmp_api.c in snmpd in Net-SNMP 5.2.x before 5.2.2, 5.1.x before 5.1.3, and 5.0.x before 5.0.10.2, when running in master agentx mode, allows remote attackers to cause a denial of service (crash) by causing a particular TCP disconnect, which triggers a free of an incorrect variable, a different vulnerability than CVE-2005-2177. • http://secunia.com/advisories/25114 http://secunia.com/advisories/25115 http://secunia.com/advisories/25411 http://sourceforge.net/tracker/index.php?func=detail&aid=1207023&group_id=12694&atid=112694 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102929-1 http://www.securityfocus.com/bid/23762 http://www.ubuntu.com/usn/USN-456-1 http://www.vupen.com/english/advisories/2007/1944 https://issues.rpath.com/browse/RPL-1334 https://oval.cisecurity.org/repository/sea • CWE-16: Configuration CWE-189: Numeric Errors •