CVE-2014-3565

snmplib/mib.c in net-snmp 5.7.0 and earlier, when the -OQ option is used, allows remote attackers to cause a denial of service (snmptrapd crash) via a crafted SNMP trap message, which triggers a conversion to the variable type designated in the MIB file, as demonstrated by a NULL type in an ifMtu trap message.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:mac_os_x:10.11.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:net-snmp:net-snmp:*:*:*:*:*:*:*:*
cpe:2.3:a:net-snmp:net-snmp:5.0:*:*:*:*:*:*:*
cpe:2.3:a:net-snmp:net-snmp:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:net-snmp:net-snmp:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:net-snmp:net-snmp:5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:net-snmp:net-snmp:5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:net-snmp:net-snmp:5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:net-snmp:net-snmp:5.0.6:*:*:*:*:*:*:*
cpe:2.3:a:net-snmp:net-snmp:5.0.7:*:*:*:*:*:*:*
cpe:2.3:a:net-snmp:net-snmp:5.0.8:*:*:*:*:*:*:*
cpe:2.3:a:net-snmp:net-snmp:5.0.9:*:*:*:*:*:*:*
cpe:2.3:a:net-snmp:net-snmp:5.1:*:*:*:*:*:*:*
cpe:2.3:a:net-snmp:net-snmp:5.1.2:*:*:*:*:*:*:*
cpe:2.3:a:net-snmp:net-snmp:5.2:*:*:*:*:*:*:*
cpe:2.3:a:net-snmp:net-snmp:5.3:*:*:*:*:*:*:*
cpe:2.3:a:net-snmp:net-snmp:5.3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:net-snmp:net-snmp:5.4:*:*:*:*:*:*:*
cpe:2.3:a:net-snmp:net-snmp:5.5:*:*:*:*:*:*:*
cpe:2.3:a:net-snmp:net-snmp:5.6:*:*:*:*:*:*:*

History

21 Nov 2024, 02:08

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html - Vendor Advisory () http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html - Vendor Advisory
References () http://lists.opensuse.org/opensuse-updates/2014-09/msg00013.html - () http://lists.opensuse.org/opensuse-updates/2014-09/msg00013.html -
References () http://rhn.redhat.com/errata/RHSA-2015-1385.html - () http://rhn.redhat.com/errata/RHSA-2015-1385.html -
References () http://sourceforge.net/p/net-snmp/code/ci/7f4a7b891332899cea26e95be0337aae01648742/ - Exploit () http://sourceforge.net/p/net-snmp/code/ci/7f4a7b891332899cea26e95be0337aae01648742/ - Exploit
References () http://sourceforge.net/p/net-snmp/official-patches/48/ - Patch () http://sourceforge.net/p/net-snmp/official-patches/48/ - Patch
References () http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html - () http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html -
References () http://www.securityfocus.com/bid/69477 - () http://www.securityfocus.com/bid/69477 -
References () http://www.ubuntu.com/usn/USN-2711-1 - () http://www.ubuntu.com/usn/USN-2711-1 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=1125155 - () https://bugzilla.redhat.com/show_bug.cgi?id=1125155 -
References () https://security.gentoo.org/glsa/201507-17 - () https://security.gentoo.org/glsa/201507-17 -
References () https://support.apple.com/HT205375 - Vendor Advisory () https://support.apple.com/HT205375 - Vendor Advisory

Information

Published : 2014-10-07 14:55

Updated : 2024-11-21 02:08


NVD link : CVE-2014-3565

Mitre link : CVE-2014-3565

CVE.ORG link : CVE-2014-3565


JSON object : View

Products Affected

apple

  • mac_os_x

net-snmp

  • net-snmp

canonical

  • ubuntu_linux
CWE
CWE-399

Resource Management Errors