USN-2166-1: Net-SNMP vulnerabilities

14 April 2014

net-snmp vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 13.10
  • Ubuntu 12.10
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary

Net-SNMP could be made to crash if it received specially crafted network traffic.

Software Description

  • net-snmp - SNMP (Simple Network Management Protocol) server and applications

Details

Ken Farnen discovered that Net-SNMP incorrectly handled AgentX timeouts. A remote attacker could use this issue to cause the server to crash or to hang, resulting in a denial of service. (CVE-2012-6151)

It was discovered that the Net-SNMP ICMP-MIB incorrectly validated input. A remote attacker could use this issue to cause the server to crash, resulting in a denial of service. This issue only affected Ubuntu 13.10. (CVE-2014-2284)

Viliam Púčik discovered that the Net-SNMP perl trap handler incorrectly handled NULL arguments. A remote attacker could use this issue to cause the server to crash, resulting in a denial of service. (CVE-2014-2285)

It was discovered that Net-SNMP incorrectly handled AgentX multi-object requests. A remote attacker could use this issue to cause the server to hang, resulting in a denial of service. This issue only affected Ubuntu 10.04 LTS, Ubuntu 12.04 LTS and Ubuntu 12.10. (CVE-2014-2310)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 13.10
libsnmp30 - 5.7.2~dfsg-8ubuntu1.1
Ubuntu 12.10
libsnmp15 - 5.4.3~dfsg-2.5ubuntu1.1
Ubuntu 12.04 LTS
libsnmp15 - 5.4.3~dfsg-2.4ubuntu1.2
Ubuntu 10.04 LTS
libsnmp15 - 5.4.2.1~dfsg0ubuntu1-0ubuntu2.3

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References