CVE-2008-2292

Buffer overflow in the __snprint_value function in snmp_get in Net-SNMP 5.1.4, 5.2.4, and 5.4.1, as used in SNMP.xs for Perl, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large OCTETSTRING in an attribute value pair (AVP).
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 94%
VendorProductVersion
net-snmpnet-snmp
5.1.4
net-snmpnet-snmp
5.2.4
net-snmpnet-snmp
5.4.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
net-snmp
bullseye (security)
5.9+dfsg-4+deb11u1
fixed
bullseye
5.9+dfsg-4+deb11u1
fixed
bookworm
5.9.3+dfsg-2
fixed
sid
5.9.4+dfsg-1.1
fixed
trixie
5.9.4+dfsg-1.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
net-snmp
intrepid
not-affected
hardy
Fixed 5.4.1~dfsg-4ubuntu4.2
released
gutsy
Fixed 5.3.1-6ubuntu2.2
released
feisty
ignored
dapper
Fixed 5.2.1.2-4ubuntu2.3
released
References