Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.55523
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2005:395
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory RHSA-2005:395.

SNMP (Simple Network Management Protocol) is a protocol used for network
management.

A denial of service bug was found in the way net-snmp uses network stream
protocols. It is possible for a remote attacker to send a net-snmp agent a
specially crafted packet that will crash the agent. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CVE-2005-2177 to this issue.

An insecure temporary file usage bug was found in net-snmp's fixproc
command. It is possible for a local user to modify the content of temporary
files used by fixproc that can lead to arbitrary command execution. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CVE-2005-1740 to this issue.

Additionally, the following bugs have been fixed:
- - The lmSensors are correctly recognized, snmp deamon no longer segfaults
- - The larger swap partition sizes are correctly reported
- - Querying hrSWInstalledLastUpdateTime no longer crashes the snmp deamon
- - Fixed error building ASN.1 representation
- - The 64-bit network counters correctly wrap
- - Large file systems are correctly handled
- - Snmptrapd initscript correctly reads options from its configuration
file /etc/snmp/snmptrapd.options
- - Snmp deamon no longer crashes when restarted using the agentX
protocol
- - snmp daemon now reports gigabit Ethernet speeds correctly
- - MAC adresses are shown when requested instead of IP adresses

All users of net-snmp should upgrade to these updated packages, which
resolve these issues.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2005-395.html

Risk factor : Critical

CVSS Score:
10.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2005-1740
BugTraq ID: 13715
http://www.securityfocus.com/bid/13715
http://security.gentoo.org/glsa/glsa-200505-18.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:025
http://www.zataz.net/adviso/net-snmp-05182005.txt
http://www.osvdb.org/16778
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11659
http://www.redhat.com/support/errata/RHSA-2005-373.html
http://www.redhat.com/support/errata/RHSA-2005-395.html
http://securitytracker.com/id?1014039
http://secunia.com/advisories/15471
http://secunia.com/advisories/16999
http://secunia.com/advisories/17135
http://secunia.com/advisories/18635
http://www.vupen.com/english/advisories/2005/0598
Common Vulnerability Exposure (CVE) ID: CVE-2005-2177
BugTraq ID: 14168
http://www.securityfocus.com/bid/14168
BugTraq ID: 21256
http://www.securityfocus.com/bid/21256
Bugtraq: 20061113 VMSA-2006-0005 - VMware ESX Server 2.5.4 Upgrade Patch 1 (Google Search)
http://www.securityfocus.com/archive/1/451419/100/200/threaded
Bugtraq: 20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4 (Google Search)
http://www.securityfocus.com/archive/1/451404/100/0/threaded
Bugtraq: 20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2 (Google Search)
http://www.securityfocus.com/archive/1/451417/100/200/threaded
Bugtraq: 20061113 VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2 (Google Search)
http://www.securityfocus.com/archive/1/451426/100/200/threaded
Debian Security Information: DSA-873 (Google Search)
http://www.debian.org/security/2005/dsa-873
http://www.net-snmp.org/about/ChangeLog.html
http://sourceforge.net/mailarchive/forum.php?thread_id=7659656&forum_id=12455
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9986
http://www.redhat.com/support/errata/RHSA-2005-720.html
http://securitytracker.com/id?1017273
http://secunia.com/advisories/15930
http://secunia.com/advisories/17007
http://secunia.com/advisories/17217
http://secunia.com/advisories/17282
http://secunia.com/advisories/17343
http://secunia.com/advisories/22875
http://secunia.com/advisories/23058
http://secunia.com/advisories/25373
http://secunia.com/advisories/25432
http://secunia.com/advisories/25787
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102725-1
SuSE Security Announcement: SUSE-SR:2005:024 (Google Search)
http://www.novell.com/linux/security/advisories/2005_24_sr.html
SuSE Security Announcement: SUSE-SR:2007:012 (Google Search)
http://www.novell.com/linux/security/advisories/2007_12_sr.html
SuSE Security Announcement: SUSE-SR:2007:013 (Google Search)
http://www.novell.com/linux/security/advisories/2007_13_sr.html
http://www.trustix.org/errata/2005/0034/
http://www.ubuntu.com/usn/usn-190-1
http://www.vupen.com/english/advisories/2006/4502
http://www.vupen.com/english/advisories/2006/4677
http://www.vupen.com/english/advisories/2007/1883
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.