Vulnerabilità: CVE-2005-2177

Net-SNMP 5.0.x prima 5.0.10.2, 5.2.x prima 5.2.1.2 e 5.1.3, quando net-snmp utilizzando stream socket quali TCP, permette attaccanti remoti di causare una negazione di servizio (daemon blocco e CPU consumo) tramite un pacchetto TCP di lunghezza 1, che attiva un ciclo infinito.


http://www.securityfocus.com/bid/14168
http://www.securityfocus.com/bid/21256
http://www.securityfocus.com/archive/1/451419/100/200/threaded
http://www.securityfocus.com/archive/1/451404/100/0/threaded
http://www.securityfocus.com/archive/1/451417/100/200/threaded
http://www.securityfocus.com/archive/1/451426/100/200/threaded
http://support.avaya.com/elmodocs2/security/ASA-2005-225.pdf
http://www.vmware.com/download/esx/esx-202-200610-patch.html
http://www.vmware.com/download/esx/esx-213-200610-patch.html
http://www.vmware.com/download/esx/esx-254-200610-patch.html
http://www.debian.org/security/2005/dsa-873
http://www.mandriva.com/security/advisories?name=MDKSA-2006:025
http://www.net-snmp.org/about/ChangeLog.html
http://sourceforge.net/mailarchive/forum.php?thread_id=7659656&forum_id=12455
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9986
http://www.redhat.com/support/errata/RHSA-2005-373.html
http://www.redhat.com/support/errata/RHSA-2005-395.html
http://www.redhat.com/support/errata/RHSA-2005-720.html
http://securitytracker.com/id?1017273
http://secunia.com/advisories/15930
http://secunia.com/advisories/16999
http://secunia.com/advisories/17007
http://secunia.com/advisories/17135
http://secunia.com/advisories/17217
http://secunia.com/advisories/17282
http://secunia.com/advisories/17343
http://secunia.com/advisories/18635
http://secunia.com/advisories/22875
http://secunia.com/advisories/23058
http://secunia.com/advisories/25373
http://secunia.com/advisories/25432
http://secunia.com/advisories/25787
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102725-1
http://www.novell.com/linux/security/advisories/2005_24_sr.html
http://www.novell.com/linux/security/advisories/2007_12_sr.html
http://www.novell.com/linux/security/advisories/2007_13_sr.html
http://www.trustix.org/errata/2005/0034/
http://www.ubuntu.com/usn/usn-190-1
http://www.vupen.com/english/advisories/2006/4502
http://www.vupen.com/english/advisories/2006/4677
http://www.vupen.com/english/advisories/2007/1883
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2177


E' possibile lasciare un commento come utenti registrati al sito, accedendo tramite social, account wordpress oppure come utenti anonimi. Nel caso in cui si desideri lasciare un commento come utenti anonimi si verrà avvisati via email di un'eventuale risposta solo se si inserisce l'indirizzo email (facoltativo). L'inserimento di qualsiasi dato nei campi dei commenti è totalmente facoltativo. Chiunque decida di inserire un qualsiasi dato accetta il trattamento di questi ultimi per i fini inerenti al servizio ovvero la risposta al commento e le comunicazioni strettamente necessarie.


Rispondi