Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.55454
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2005:373
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing updates announced in
advisory RHSA-2005:373.

A denial of service bug was found in the way net-snmp uses network stream
protocols. It is possible for a remote attacker to send a net-snmp agent a
specially crafted packet which will crash the agent. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CVE-2005-2177 to this issue.

An insecure temporary file usage bug was found in net-snmp's fixproc
command. It is possible for a local user to modify the content of temporary
files used by fixproc which can lead to arbitrary command execution. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CVE-2005-1740 to this issue.

Additionally the following bugs have been fixed:
- snmpwalk no longer hangs when a non-existant pid is listed.
- snmpd no longer segfaults due to incorrect handling of lmSensors.
- an incorrect assignment leading to invalid values in ASN mibs has been
fixed.
- on systems running a 64-bit kernel, the values in /proc/net/dev no
longer become too large to fit in a 32-bit object.
- the net-snmp-devel packages correctly depend on elfutils-libelf-devel.
- large file systems are correctly handled
- snmp daemon now reports gigabit Ethernet speeds correctly
- fixed consistency between IP adresses and hostnames in configuration file

All users of net-snmp should upgrade to these updated packages, which
resolve these issues.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2005-373.html

Risk factor : Critical

CVSS Score:
10.0

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2005-2177
BugTraq ID: 14168
http://www.securityfocus.com/bid/14168
BugTraq ID: 21256
http://www.securityfocus.com/bid/21256
Bugtraq: 20061113 VMSA-2006-0005 - VMware ESX Server 2.5.4 Upgrade Patch 1 (Google Search)
http://www.securityfocus.com/archive/1/451419/100/200/threaded
Bugtraq: 20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4 (Google Search)
http://www.securityfocus.com/archive/1/451404/100/0/threaded
Bugtraq: 20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2 (Google Search)
http://www.securityfocus.com/archive/1/451417/100/200/threaded
Bugtraq: 20061113 VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2 (Google Search)
http://www.securityfocus.com/archive/1/451426/100/200/threaded
Debian Security Information: DSA-873 (Google Search)
http://www.debian.org/security/2005/dsa-873
http://www.mandriva.com/security/advisories?name=MDKSA-2006:025
http://www.net-snmp.org/about/ChangeLog.html
http://sourceforge.net/mailarchive/forum.php?thread_id=7659656&forum_id=12455
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9986
http://www.redhat.com/support/errata/RHSA-2005-373.html
http://www.redhat.com/support/errata/RHSA-2005-395.html
http://www.redhat.com/support/errata/RHSA-2005-720.html
http://securitytracker.com/id?1017273
http://secunia.com/advisories/15930
http://secunia.com/advisories/16999
http://secunia.com/advisories/17007
http://secunia.com/advisories/17135
http://secunia.com/advisories/17217
http://secunia.com/advisories/17282
http://secunia.com/advisories/17343
http://secunia.com/advisories/18635
http://secunia.com/advisories/22875
http://secunia.com/advisories/23058
http://secunia.com/advisories/25373
http://secunia.com/advisories/25432
http://secunia.com/advisories/25787
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102725-1
SuSE Security Announcement: SUSE-SR:2005:024 (Google Search)
http://www.novell.com/linux/security/advisories/2005_24_sr.html
SuSE Security Announcement: SUSE-SR:2007:012 (Google Search)
http://www.novell.com/linux/security/advisories/2007_12_sr.html
SuSE Security Announcement: SUSE-SR:2007:013 (Google Search)
http://www.novell.com/linux/security/advisories/2007_13_sr.html
http://www.trustix.org/errata/2005/0034/
http://www.ubuntu.com/usn/usn-190-1
http://www.vupen.com/english/advisories/2006/4502
http://www.vupen.com/english/advisories/2006/4677
http://www.vupen.com/english/advisories/2007/1883
Common Vulnerability Exposure (CVE) ID: CVE-2005-1740
BugTraq ID: 13715
http://www.securityfocus.com/bid/13715
http://security.gentoo.org/glsa/glsa-200505-18.xml
http://www.zataz.net/adviso/net-snmp-05182005.txt
http://www.osvdb.org/16778
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11659
http://securitytracker.com/id?1014039
http://secunia.com/advisories/15471
http://www.vupen.com/english/advisories/2005/0598
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.