Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown

CVE-2014-3565

Disclosure Date: October 07, 2014 (last updated October 05, 2023)
snmplib/mib.c in net-snmp 5.7.0 and earlier, when the -OQ option is used, allows remote attackers to cause a denial of service (snmptrapd crash) via a crafted SNMP trap message, which triggers a conversion to the variable type designated in the MIB file, as demonstrated by a NULL type in an ifMtu trap message.
0
Attacker Value
Unknown

CVE-2012-6151

Disclosure Date: December 13, 2013 (last updated October 05, 2023)
Net-SNMP 5.7.1 and earlier, when AgentX is registering to handle a MIB and processing GETNEXT requests, allows remote attackers to cause a denial of service (crash or infinite loop, CPU consumption, and hang) by causing the AgentX subagent to timeout.
0
Attacker Value
Unknown

CVE-2008-2292

Disclosure Date: May 18, 2008 (last updated October 04, 2023)
Buffer overflow in the __snprint_value function in snmp_get in Net-SNMP 5.1.4, 5.2.4, and 5.4.1, as used in SNMP.xs for Perl, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large OCTETSTRING in an attribute value pair (AVP).
0
Attacker Value
Unknown

CVE-2005-2811

Disclosure Date: September 07, 2005 (last updated February 22, 2025)
Untrusted search path vulnerability in Net-SNMP 5.2.1.2 and earlier, on Gentoo Linux, installs certain Perl modules with an insecure DT_RPATH, which could allow local users to gain privileges.
0
Attacker Value
Unknown

CVE-2005-2177

Disclosure Date: July 11, 2005 (last updated February 22, 2025)
Net-SNMP 5.0.x before 5.0.10.2, 5.2.x before 5.2.1.2, and 5.1.3, when net-snmp is using stream sockets such as TCP, allows remote attackers to cause a denial of service (daemon hang and CPU consumption) via a TCP packet of length 1, which triggers an infinite loop.
0
Attacker Value
Unknown

CVE-2005-1740

Disclosure Date: May 24, 2005 (last updated February 22, 2025)
fixproc in Net-snmp 5.x before 5.2.1-r1 creates temporary files insecurely, which allows local users to modify the contents of those files to execute arbitrary commands, or overwrite arbitrary files via a symlink attack.
0