CVE-2012-6151
Net-SNMP - SNMPD AgentX Subagent Timeout Denial of Service
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
3Exploited in Wild
-Decision
Descriptions
Net-SNMP 5.7.1 and earlier, when AgentX is registering to handle a MIB and processing GETNEXT requests, allows remote attackers to cause a denial of service (crash or infinite loop, CPU consumption, and hang) by causing the AgentX subagent to timeout.
Net-SNMP 5.7.1 y anteriores, cuando AgentX está registrando para manejar una MIB y tramitación de solicitudes de GETNEXT, permite a atacantes remotos provocar una denegación de servicio (caída o bucle infinito, consumo de CPU, y bloqueo) causando timeout en el subagente AgentX
The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol, including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base browser. A denial of service flaw was found in the way snmpd, the Net-SNMP daemon, handled subagent timeouts. A remote attacker able to trigger a subagent timeout could use this flaw to cause snmpd to loop infinitely or crash.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2012-09-05 First Exploit
- 2012-12-06 CVE Reserved
- 2013-12-13 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-399: Resource Management Errors
CAPEC
References (17)
URL | Tag | Source |
---|---|---|
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 | X_refsource_confirm | |
http://seclists.org/oss-sec/2013/q4/398 | Mailing List |
|
http://seclists.org/oss-sec/2013/q4/415 | Mailing List |
|
http://secunia.com/advisories/55804 | Third Party Advisory | |
http://secunia.com/advisories/57870 | Third Party Advisory | |
http://secunia.com/advisories/59974 | Third Party Advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/89485 | Vdb Entry | |
https://support.apple.com/HT205375 | X_refsource_confirm |
|
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/38854 | 2012-09-05 | |
http://sourceforge.net/p/net-snmp/bugs/2411 | 2024-08-06 | |
http://www.securityfocus.com/bid/64048 | 2024-08-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html | 2017-08-29 | |
http://www.gentoo.org/security/en/glsa/glsa-201409-02.xml | 2017-08-29 | |
http://www.ubuntu.com/usn/USN-2166-1 | 2017-08-29 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1038007 | 2014-03-24 | |
https://rhn.redhat.com/errata/RHSA-2014-0322.html | 2017-08-29 | |
https://access.redhat.com/security/cve/CVE-2012-6151 | 2014-03-24 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.11.0 Search vendor "Apple" for product "Mac Os X" and version "10.11.0" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 10.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "10.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 12.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "12.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 12.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "12.10" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 13.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "13.10" | - |
Affected
| ||||||
Net-snmp Search vendor "Net-snmp" | Net-snmp Search vendor "Net-snmp" for product "Net-snmp" | <= 5.7.1 Search vendor "Net-snmp" for product "Net-snmp" and version " <= 5.7.1" | - |
Affected
| ||||||
Net-snmp Search vendor "Net-snmp" | Net-snmp Search vendor "Net-snmp" for product "Net-snmp" | 5.0 Search vendor "Net-snmp" for product "Net-snmp" and version "5.0" | - |
Affected
| ||||||
Net-snmp Search vendor "Net-snmp" | Net-snmp Search vendor "Net-snmp" for product "Net-snmp" | 5.0.1 Search vendor "Net-snmp" for product "Net-snmp" and version "5.0.1" | - |
Affected
| ||||||
Net-snmp Search vendor "Net-snmp" | Net-snmp Search vendor "Net-snmp" for product "Net-snmp" | 5.0.2 Search vendor "Net-snmp" for product "Net-snmp" and version "5.0.2" | - |
Affected
| ||||||
Net-snmp Search vendor "Net-snmp" | Net-snmp Search vendor "Net-snmp" for product "Net-snmp" | 5.0.3 Search vendor "Net-snmp" for product "Net-snmp" and version "5.0.3" | - |
Affected
| ||||||
Net-snmp Search vendor "Net-snmp" | Net-snmp Search vendor "Net-snmp" for product "Net-snmp" | 5.0.4 Search vendor "Net-snmp" for product "Net-snmp" and version "5.0.4" | - |
Affected
| ||||||
Net-snmp Search vendor "Net-snmp" | Net-snmp Search vendor "Net-snmp" for product "Net-snmp" | 5.0.5 Search vendor "Net-snmp" for product "Net-snmp" and version "5.0.5" | - |
Affected
| ||||||
Net-snmp Search vendor "Net-snmp" | Net-snmp Search vendor "Net-snmp" for product "Net-snmp" | 5.0.6 Search vendor "Net-snmp" for product "Net-snmp" and version "5.0.6" | - |
Affected
| ||||||
Net-snmp Search vendor "Net-snmp" | Net-snmp Search vendor "Net-snmp" for product "Net-snmp" | 5.0.7 Search vendor "Net-snmp" for product "Net-snmp" and version "5.0.7" | - |
Affected
| ||||||
Net-snmp Search vendor "Net-snmp" | Net-snmp Search vendor "Net-snmp" for product "Net-snmp" | 5.0.8 Search vendor "Net-snmp" for product "Net-snmp" and version "5.0.8" | - |
Affected
| ||||||
Net-snmp Search vendor "Net-snmp" | Net-snmp Search vendor "Net-snmp" for product "Net-snmp" | 5.0.9 Search vendor "Net-snmp" for product "Net-snmp" and version "5.0.9" | - |
Affected
| ||||||
Net-snmp Search vendor "Net-snmp" | Net-snmp Search vendor "Net-snmp" for product "Net-snmp" | 5.1 Search vendor "Net-snmp" for product "Net-snmp" and version "5.1" | - |
Affected
| ||||||
Net-snmp Search vendor "Net-snmp" | Net-snmp Search vendor "Net-snmp" for product "Net-snmp" | 5.1.2 Search vendor "Net-snmp" for product "Net-snmp" and version "5.1.2" | - |
Affected
| ||||||
Net-snmp Search vendor "Net-snmp" | Net-snmp Search vendor "Net-snmp" for product "Net-snmp" | 5.2 Search vendor "Net-snmp" for product "Net-snmp" and version "5.2" | - |
Affected
| ||||||
Net-snmp Search vendor "Net-snmp" | Net-snmp Search vendor "Net-snmp" for product "Net-snmp" | 5.3 Search vendor "Net-snmp" for product "Net-snmp" and version "5.3" | - |
Affected
| ||||||
Net-snmp Search vendor "Net-snmp" | Net-snmp Search vendor "Net-snmp" for product "Net-snmp" | 5.3.0.1 Search vendor "Net-snmp" for product "Net-snmp" and version "5.3.0.1" | - |
Affected
| ||||||
Net-snmp Search vendor "Net-snmp" | Net-snmp Search vendor "Net-snmp" for product "Net-snmp" | 5.4 Search vendor "Net-snmp" for product "Net-snmp" and version "5.4" | - |
Affected
| ||||||
Net-snmp Search vendor "Net-snmp" | Net-snmp Search vendor "Net-snmp" for product "Net-snmp" | 5.5 Search vendor "Net-snmp" for product "Net-snmp" and version "5.5" | - |
Affected
| ||||||
Net-snmp Search vendor "Net-snmp" | Net-snmp Search vendor "Net-snmp" for product "Net-snmp" | 5.6 Search vendor "Net-snmp" for product "Net-snmp" and version "5.6" | - |
Affected
| ||||||
Net-snmp Search vendor "Net-snmp" | Net-snmp Search vendor "Net-snmp" for product "Net-snmp" | 5.7 Search vendor "Net-snmp" for product "Net-snmp" and version "5.7" | - |
Affected
|