CVE-2008-2292

Source
https://nvd.nist.gov/vuln/detail/CVE-2008-2292
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2008-2292.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2008-2292
Related
Published
2008-05-18T14:20:00Z
Modified
2024-06-30T12:01:22Z
Summary
[none]
Details

Buffer overflow in the _snprintvalue function in snmp_get in Net-SNMP 5.1.4, 5.2.4, and 5.4.1, as used in SNMP.xs for Perl, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large OCTETSTRING in an attribute value pair (AVP).

References

Affected packages

Debian:11 / net-snmp

Package

Name
net-snmp
Purl
pkg:deb/debian/net-snmp?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.1~dfsg-8

Ecosystem specific

{
    "urgency": "medium"
}

Debian:12 / net-snmp

Package

Name
net-snmp
Purl
pkg:deb/debian/net-snmp?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.1~dfsg-8

Ecosystem specific

{
    "urgency": "medium"
}

Debian:13 / net-snmp

Package

Name
net-snmp
Purl
pkg:deb/debian/net-snmp?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.4.1~dfsg-8

Ecosystem specific

{
    "urgency": "medium"
}