CVE-2014-2284
net-snmp: denial of service flaw in Linux implementation of ICMP-MIB
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The Linux implementation of the ICMP-MIB in Net-SNMP 5.5 before 5.5.2.1, 5.6.x before 5.6.2.1, and 5.7.x before 5.7.2.1 does not properly validate input, which allows remote attackers to cause a denial of service via unspecified vectors.
La implementación Linux del ICMP-MIB en Net-SNMP 5.5 anterior a 5.5.2.1, 5.6.x anterior a 5.6.2.1 y 5.7.x anterior a 5.7.2.1 no valida debidamente las entradas, lo que permite a atacantes remotos causar una denegación de servicio a través de vectores no especificados.
The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol, including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base browser. A buffer overflow flaw was found in the way the decode_icmp_msg() function in the ICMP-MIB implementation processed Internet Control Message Protocol message statistics reported in the /proc/net/snmp file. A remote attacker could send a message for each ICMP message type, which could potentially cause the snmpd service to crash when processing the /proc/net/snmp file.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-03-05 CVE Reserved
- 2014-03-13 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
CAPEC
References (14)
URL | Tag | Source |
---|---|---|
http://comments.gmane.org/gmane.comp.security.oss.general/12284 | Mailing List | |
http://secunia.com/advisories/57124 | Third Party Advisory | |
http://secunia.com/advisories/57583 | Third Party Advisory | |
http://secunia.com/advisories/57870 | Third Party Advisory | |
http://secunia.com/advisories/59974 | Third Party Advisory | |
http://sourceforge.net/p/net-snmp/code/ci/a1fd64716f6794c55c34d77e618210238a73bfa1 | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2014-03/msg00060.html | 2014-09-13 | |
http://lists.opensuse.org/opensuse-updates/2014-03/msg00061.html | 2014-09-13 | |
http://rhn.redhat.com/errata/RHSA-2014-0321.html | 2014-09-13 | |
http://secunia.com/advisories/57526 | 2014-09-13 | |
http://www.gentoo.org/security/en/glsa/glsa-201409-02.xml | 2014-09-13 | |
http://www.ubuntu.com/usn/USN-2166-1 | 2014-09-13 | |
https://access.redhat.com/security/cve/CVE-2014-2284 | 2014-03-24 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1070396 | 2014-03-24 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Net-snmp Search vendor "Net-snmp" | Net-snmp Search vendor "Net-snmp" for product "Net-snmp" | 5.5 Search vendor "Net-snmp" for product "Net-snmp" and version "5.5" | - |
Affected
| ||||||
Net-snmp Search vendor "Net-snmp" | Net-snmp Search vendor "Net-snmp" for product "Net-snmp" | 5.5.0.1 Search vendor "Net-snmp" for product "Net-snmp" and version "5.5.0.1" | - |
Affected
| ||||||
Net-snmp Search vendor "Net-snmp" | Net-snmp Search vendor "Net-snmp" for product "Net-snmp" | 5.5.0.2 Search vendor "Net-snmp" for product "Net-snmp" and version "5.5.0.2" | - |
Affected
| ||||||
Net-snmp Search vendor "Net-snmp" | Net-snmp Search vendor "Net-snmp" for product "Net-snmp" | 5.5.1 Search vendor "Net-snmp" for product "Net-snmp" and version "5.5.1" | - |
Affected
| ||||||
Net-snmp Search vendor "Net-snmp" | Net-snmp Search vendor "Net-snmp" for product "Net-snmp" | 5.5.1.1 Search vendor "Net-snmp" for product "Net-snmp" and version "5.5.1.1" | - |
Affected
| ||||||
Net-snmp Search vendor "Net-snmp" | Net-snmp Search vendor "Net-snmp" for product "Net-snmp" | 5.5.2 Search vendor "Net-snmp" for product "Net-snmp" and version "5.5.2" | - |
Affected
| ||||||
Net-snmp Search vendor "Net-snmp" | Net-snmp Search vendor "Net-snmp" for product "Net-snmp" | 5.6 Search vendor "Net-snmp" for product "Net-snmp" and version "5.6" | - |
Affected
| ||||||
Net-snmp Search vendor "Net-snmp" | Net-snmp Search vendor "Net-snmp" for product "Net-snmp" | 5.6.1.1 Search vendor "Net-snmp" for product "Net-snmp" and version "5.6.1.1" | - |
Affected
| ||||||
Net-snmp Search vendor "Net-snmp" | Net-snmp Search vendor "Net-snmp" for product "Net-snmp" | 5.6.2 Search vendor "Net-snmp" for product "Net-snmp" and version "5.6.2" | - |
Affected
| ||||||
Net-snmp Search vendor "Net-snmp" | Net-snmp Search vendor "Net-snmp" for product "Net-snmp" | 5.7 Search vendor "Net-snmp" for product "Net-snmp" and version "5.7" | - |
Affected
| ||||||
Net-snmp Search vendor "Net-snmp" | Net-snmp Search vendor "Net-snmp" for product "Net-snmp" | 5.7.1 Search vendor "Net-snmp" for product "Net-snmp" and version "5.7.1" | - |
Affected
| ||||||
Net-snmp Search vendor "Net-snmp" | Net-snmp Search vendor "Net-snmp" for product "Net-snmp" | 5.7.2 Search vendor "Net-snmp" for product "Net-snmp" and version "5.7.2" | - |
Affected
|