15th Oct 2002  [SBWID-5748]
	
COMMAND
	Net-SNMP denial-of-service vulnerability
SYSTEMS AFFECTED
	All  SNMP  daemon  based  on  the  Net-SNMP  package  5.0.1,  5.0.3  and
	5.0.4.pre2
PROBLEM
	In iDEFENSE Security Advisory [#20021002]  thanks  to  Andrew  Griffiths
	[andrewg@d2.net.au] research :
	
	The SNMP daemon included in the Net-SNMP package can be  crashed  if  it
	attempts to process a specially crafted  packet.  Exploitation  requires
	foreknowledge  of  a  known  SNMP  community  string  (either  read   or
	read/write). This issue potentially affects  any  Net-SNMP  installation
	in which the "public" read-only community string has not been changed.
	
	 ANALYSIS
	
	By sending the SNMP  daemon  a  packet  without  having  first  setup  a
	session,  a  vulnerability  in  the  following  segment  of  code   from
	agent/snmp_agent.c,   handle_var_requests(),   line   1,876,   can    be
	exploited:
	
	    for (i = 0; i <= asp->treecache_num; i++) {
	        reginfo = asp->treecache[i].subtree->reginfo;
	        status = netsnmp_call_handlers(reginfo, asp->reqinfo,
	                     asp->treecache[i].requests_begin);
	
	Despite  the  fact  that  "asp->treecache_num"  is  NULL,  the   "<="
	comparison in the for() loop  allows  entry  into  the  block.  At  this
	point, the SNMP daemon attempts to de-reference a NULL  pointer  leading
	to a SIGSEGV. Since the SNMP daemon must parse  the  attack  packet,  an
	attacker must pass the appropriate ACL (public/read is sufficient).
SOLUTION
	Net-SNMP  5.0.5  has   been   released   which   fixes   the   described
	vulnerability. It is available at
	
	 http://sourceforge.net/project/showfiles.php?group_id=12694
	
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH