// For flags

CVE-2005-2177

 

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Net-SNMP 5.0.x before 5.0.10.2, 5.2.x before 5.2.1.2, and 5.1.3, when net-snmp is using stream sockets such as TCP, allows remote attackers to cause a denial of service (daemon hang and CPU consumption) via a TCP packet of length 1, which triggers an infinite loop.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2005-07-10 CVE Reserved
  • 2005-07-10 CVE Published
  • 2024-08-07 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
References (43)
URL Date SRC
URL Date SRC
http://secunia.com/advisories/15930 2018-10-19
http://secunia.com/advisories/16999 2018-10-19
http://secunia.com/advisories/17007 2018-10-19
http://secunia.com/advisories/17135 2018-10-19
http://secunia.com/advisories/17217 2018-10-19
http://secunia.com/advisories/17282 2018-10-19
http://secunia.com/advisories/17343 2018-10-19
http://secunia.com/advisories/18635 2018-10-19
http://secunia.com/advisories/22875 2018-10-19
http://secunia.com/advisories/23058 2018-10-19
http://secunia.com/advisories/25373 2018-10-19
http://secunia.com/advisories/25432 2018-10-19
http://secunia.com/advisories/25787 2018-10-19
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102725-1 2018-10-19
http://www.debian.org/security/2005/dsa-873 2018-10-19
http://www.mandriva.com/security/advisories?name=MDKSA-2006:025 2018-10-19
http://www.novell.com/linux/security/advisories/2005_24_sr.html 2018-10-19
http://www.novell.com/linux/security/advisories/2007_12_sr.html 2018-10-19
http://www.novell.com/linux/security/advisories/2007_13_sr.html 2018-10-19
http://www.redhat.com/support/errata/RHSA-2005-373.html 2018-10-19
http://www.redhat.com/support/errata/RHSA-2005-395.html 2018-10-19
http://www.redhat.com/support/errata/RHSA-2005-720.html 2018-10-19
http://www.ubuntu.com/usn/usn-190-1 2018-10-19
http://www.vupen.com/english/advisories/2006/4502 2018-10-19
http://www.vupen.com/english/advisories/2006/4677 2018-10-19
http://www.vupen.com/english/advisories/2007/1883 2018-10-19
https://access.redhat.com/security/cve/CVE-2005-2177 2005-08-09
https://bugzilla.redhat.com/show_bug.cgi?id=1617692 2005-08-09
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Net-snmp
Search vendor "Net-snmp"
Net-snmp
Search vendor "Net-snmp" for product "Net-snmp"
5.0
Search vendor "Net-snmp" for product "Net-snmp" and version "5.0"
-
Affected
Net-snmp
Search vendor "Net-snmp"
Net-snmp
Search vendor "Net-snmp" for product "Net-snmp"
5.0.1
Search vendor "Net-snmp" for product "Net-snmp" and version "5.0.1"
-
Affected
Net-snmp
Search vendor "Net-snmp"
Net-snmp
Search vendor "Net-snmp" for product "Net-snmp"
5.0.2
Search vendor "Net-snmp" for product "Net-snmp" and version "5.0.2"
-
Affected
Net-snmp
Search vendor "Net-snmp"
Net-snmp
Search vendor "Net-snmp" for product "Net-snmp"
5.0.3
Search vendor "Net-snmp" for product "Net-snmp" and version "5.0.3"
-
Affected
Net-snmp
Search vendor "Net-snmp"
Net-snmp
Search vendor "Net-snmp" for product "Net-snmp"
5.0.4_pre2
Search vendor "Net-snmp" for product "Net-snmp" and version "5.0.4_pre2"
-
Affected
Net-snmp
Search vendor "Net-snmp"
Net-snmp
Search vendor "Net-snmp" for product "Net-snmp"
5.0.5
Search vendor "Net-snmp" for product "Net-snmp" and version "5.0.5"
-
Affected
Net-snmp
Search vendor "Net-snmp"
Net-snmp
Search vendor "Net-snmp" for product "Net-snmp"
5.0.6
Search vendor "Net-snmp" for product "Net-snmp" and version "5.0.6"
-
Affected
Net-snmp
Search vendor "Net-snmp"
Net-snmp
Search vendor "Net-snmp" for product "Net-snmp"
5.0.7
Search vendor "Net-snmp" for product "Net-snmp" and version "5.0.7"
-
Affected
Net-snmp
Search vendor "Net-snmp"
Net-snmp
Search vendor "Net-snmp" for product "Net-snmp"
5.0.8
Search vendor "Net-snmp" for product "Net-snmp" and version "5.0.8"
-
Affected
Net-snmp
Search vendor "Net-snmp"
Net-snmp
Search vendor "Net-snmp" for product "Net-snmp"
5.0.9
Search vendor "Net-snmp" for product "Net-snmp" and version "5.0.9"
-
Affected
Net-snmp
Search vendor "Net-snmp"
Net-snmp
Search vendor "Net-snmp" for product "Net-snmp"
5.0.10
Search vendor "Net-snmp" for product "Net-snmp" and version "5.0.10"
-
Affected
Net-snmp
Search vendor "Net-snmp"
Net-snmp
Search vendor "Net-snmp" for product "Net-snmp"
5.1.3
Search vendor "Net-snmp" for product "Net-snmp" and version "5.1.3"
-
Affected
Net-snmp
Search vendor "Net-snmp"
Net-snmp
Search vendor "Net-snmp" for product "Net-snmp"
5.2
Search vendor "Net-snmp" for product "Net-snmp" and version "5.2"
-
Affected
Net-snmp
Search vendor "Net-snmp"
Net-snmp
Search vendor "Net-snmp" for product "Net-snmp"
5.2.1
Search vendor "Net-snmp" for product "Net-snmp" and version "5.2.1"
-
Affected