CVE-2018-18065

_set_key in agent/helpers/table_container.c in Net-SNMP before 5.8 has a NULL Pointer Exception bug that can be used by an authenticated attacker to remotely cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.
References
Link Resource
http://www.securityfocus.com/bid/106265 Third Party Advisory VDB Entry
https://cert-portal.siemens.com/productcert/pdf/ssa-978220.pdf
https://dumpco.re/blog/net-snmp-5.7.3-remote-dos Exploit Patch Third Party Advisory
https://security.netapp.com/advisory/ntap-20181107-0001/ Third Party Advisory
https://security.paloaltonetworks.com/CVE-2018-18065
https://sourceforge.net/p/net-snmp/code/ci/7ffb8e25a0db851953155de91f0170e9bf8c457d/ Patch Third Party Advisory
https://usn.ubuntu.com/3792-1/ Third Party Advisory
https://usn.ubuntu.com/3792-2/ Third Party Advisory
https://usn.ubuntu.com/3792-3/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4314 Third Party Advisory
https://www.exploit-db.com/exploits/45547/ Exploit Patch Third Party Advisory VDB Entry
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
http://www.securityfocus.com/bid/106265 Third Party Advisory VDB Entry
https://cert-portal.siemens.com/productcert/pdf/ssa-978220.pdf
https://dumpco.re/blog/net-snmp-5.7.3-remote-dos Exploit Patch Third Party Advisory
https://security.netapp.com/advisory/ntap-20181107-0001/ Third Party Advisory
https://security.paloaltonetworks.com/CVE-2018-18065
https://sourceforge.net/p/net-snmp/code/ci/7ffb8e25a0db851953155de91f0170e9bf8c457d/ Patch Third Party Advisory
https://usn.ubuntu.com/3792-1/ Third Party Advisory
https://usn.ubuntu.com/3792-2/ Third Party Advisory
https://usn.ubuntu.com/3792-3/ Third Party Advisory
https://www.debian.org/security/2018/dsa-4314 Third Party Advisory
https://www.exploit-db.com/exploits/45547/ Exploit Patch Third Party Advisory VDB Entry
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
Configurations

Configuration 1 (hide)

cpe:2.3:a:net-snmp:net-snmp:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:hyper_converged_infrastructure:-:*:*:*:*:*:*:*
cpe:2.3:a:netapp:storagegrid_webscale:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:data_ontap:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*
cpe:2.3:o:netapp:solidfire_element_os:-:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:55

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/106265 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/106265 - Third Party Advisory, VDB Entry
References () https://cert-portal.siemens.com/productcert/pdf/ssa-978220.pdf - () https://cert-portal.siemens.com/productcert/pdf/ssa-978220.pdf -
References () https://dumpco.re/blog/net-snmp-5.7.3-remote-dos - Exploit, Patch, Third Party Advisory () https://dumpco.re/blog/net-snmp-5.7.3-remote-dos - Exploit, Patch, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20181107-0001/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20181107-0001/ - Third Party Advisory
References () https://security.paloaltonetworks.com/CVE-2018-18065 - () https://security.paloaltonetworks.com/CVE-2018-18065 -
References () https://sourceforge.net/p/net-snmp/code/ci/7ffb8e25a0db851953155de91f0170e9bf8c457d/ - Patch, Third Party Advisory () https://sourceforge.net/p/net-snmp/code/ci/7ffb8e25a0db851953155de91f0170e9bf8c457d/ - Patch, Third Party Advisory
References () https://usn.ubuntu.com/3792-1/ - Third Party Advisory () https://usn.ubuntu.com/3792-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3792-2/ - Third Party Advisory () https://usn.ubuntu.com/3792-2/ - Third Party Advisory
References () https://usn.ubuntu.com/3792-3/ - Third Party Advisory () https://usn.ubuntu.com/3792-3/ - Third Party Advisory
References () https://www.debian.org/security/2018/dsa-4314 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4314 - Third Party Advisory
References () https://www.exploit-db.com/exploits/45547/ - Exploit, Patch, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/45547/ - Exploit, Patch, Third Party Advisory, VDB Entry
References () https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html - () https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html -

Information

Published : 2018-10-08 18:29

Updated : 2024-11-21 03:55


NVD link : CVE-2018-18065

Mitre link : CVE-2018-18065

CVE.ORG link : CVE-2018-18065


JSON object : View

Products Affected

netapp

  • cloud_backup
  • solidfire_element_os
  • storagegrid_webscale
  • data_ontap
  • e-series_santricity_os_controller
  • hyper_converged_infrastructure

canonical

  • ubuntu_linux

debian

  • debian_linux

net-snmp

  • net-snmp

paloaltonetworks

  • pan-os
CWE
CWE-476

NULL Pointer Dereference