Stack-based buffer overflow in lib/snmpagent.c in bsnmpd, as used in FreeBSD 8.3 through 10.0, allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a crafted GETBULK PDU request.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/56496 - Vendor Advisory | |
References | () http://svnweb.freebsd.org/base?view=revision&%3Brevision=260636 - | |
References | () http://www.freebsd.org/security/advisories/FreeBSD-SA-14:01.bsnmpd.asc - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/64967 - | |
References | () http://www.securitytracker.com/id/1029616 - |
07 Nov 2023, 02:18
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2014-01-21 15:17
Updated : 2024-11-21 02:04
NVD link : CVE-2014-1452
Mitre link : CVE-2014-1452
CVE.ORG link : CVE-2014-1452
JSON object : View
Products Affected
freebsd
- freebsd
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer