handle_ipDefaultTTL in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.8 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker (who has write access) to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Net-snmp | Net-snmp | 5.8 (including) | 5.9.3 (including) |
Red Hat Enterprise Linux 8 | RedHat | net-snmp-1:5.8-27.el8 | * |
Red Hat Enterprise Linux 8 | RedHat | net-snmp-1:5.8-27.el8 | * |
Red Hat Enterprise Linux 9 | RedHat | net-snmp-1:5.9.1-9.el9 | * |
Net-snmp | Ubuntu | bionic | * |
Net-snmp | Ubuntu | esm-infra/xenial | * |
Net-snmp | Ubuntu | focal | * |
Net-snmp | Ubuntu | jammy | * |
Net-snmp | Ubuntu | kinetic | * |
Net-snmp | Ubuntu | lunar | * |
Net-snmp | Ubuntu | trusty | * |
Net-snmp | Ubuntu | trusty/esm | * |
Net-snmp | Ubuntu | xenial | * |