handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.4.3 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.
References
Link | Resource |
---|---|
https://gist.github.com/menglong2234/d07a65b5028145c9f4e1d1db8c4c202f | Exploit Third Party Advisory |
https://github.com/net-snmp/net-snmp/issues/475 | Exploit Issue Tracking Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/01/msg00010.html | Mailing List Third Party Advisory |
https://security.netapp.com/advisory/ntap-20230223-0011/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
History
No history.
Information
Published : 2022-11-07 03:15
Updated : 2024-02-28 19:29
NVD link : CVE-2022-44793
Mitre link : CVE-2022-44793
CVE.ORG link : CVE-2022-44793
JSON object : View
Products Affected
netapp
- h300s_firmware
- h500s_firmware
- h410s_firmware
- h500s
- h700s_firmware
- h410s
- h300s
- h700s
debian
- debian_linux
net-snmp
- net-snmp
CWE
CWE-476
NULL Pointer Dereference