English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 61204 CVE descriptions
and 32582 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.62848
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-685-1 (net-snmp)
Summary:Ubuntu USN-685-1 (net-snmp)
Description:
The remote host is missing an update to net-snmp
announced via advisory USN-685-1.

==========================================================
A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 7.10
Ubuntu 8.04 LTS
Ubuntu 8.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
libsnmp-perl 5.2.1.2-4ubuntu2.3
libsnmp9 5.2.1.2-4ubuntu2.3

Ubuntu 7.10:
libsnmp-perl 5.3.1-6ubuntu2.2
libsnmp10 5.3.1-6ubuntu2.2

Ubuntu 8.04 LTS:
libsnmp-perl 5.4.1~
dfsg-4ubuntu4.2
libsnmp15 5.4.1~
dfsg-4ubuntu4.2

Ubuntu 8.10:
libsnmp15 5.4.1~
dfsg-7.1ubuntu6.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

Details follow:

Wes Hardaker discovered that the SNMP service did not correctly validate
HMAC authentication requests. An unauthenticated remote attacker
could send specially crafted SNMPv3 traffic with a valid username
and gain access to the user's views without a valid authentication
passphrase. (CVE-2008-0960)

John Kortink discovered that the Net-SNMP Perl module did not correctly
check the size of returned values. If a user or automated system were
tricked into querying a malicious SNMP server, the application using
the Perl module could be made to crash, leading to a denial of service.
This did not affect Ubuntu 8.10. (CVE-2008-2292)

It was discovered that the SNMP service did not correctly handle large
GETBULK requests. If an unauthenticated remote attacker sent a specially
crafted request, the SNMP service could be made to crash, leading to a
denial of service. (CVE-2008-4309)





Solution:
http://www.securityspace.com/smysecure/catid.html?in=USN-685-1

Risk factor : Critical
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-0960
Bugtraq: 20080609 [oCERT-2008-006] multiple SNMP implementations HMAC authentication spoofing (Google Search)
http://www.securityfocus.com/archive/1/archive/1/493218/100/0/threaded
Bugtraq: 20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff (Google Search)
http://www.securityfocus.com/archive/1/archive/1/497962/100/0/threaded
http://www.milw0rm.com/exploits/5790
http://www.openwall.com/lists/oss-security/2008/06/09/1
http://lists.ingate.com/pipermail/productinfo/2008/000021.html
http://www.ocert.org/advisories/ocert-2008-006.html
http://www.vmware.com/security/advisories/VMSA-2008-0017.html
http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html
Cisco Security Advisory: 20080610 SNMP Version 3 Authentication Vulnerabilities
http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml
Debian Security Information: DSA-1663 (Google Search)
http://www.debian.org/security/2008/dsa-1663
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html
http://security.gentoo.org/glsa/glsa-200808-02.xml
HPdes Security Advisory: HPSBMA02439
http://marc.info/?l=bugtraq&m=127730470825399&w=2
HPdes Security Advisory: SSRT080082
http://www.mandriva.com/security/advisories?name=MDVSA-2008:118
RedHat Security Advisories: RHSA-2008:0528
http://rhn.redhat.com/errata/RHSA-2008-0528.html
http://www.redhat.com/support/errata/RHSA-2008-0529.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1
SuSE Security Announcement: SUSE-SA:2008:039 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html
http://www.ubuntu.com/usn/usn-685-1
Cert/CC Advisory: TA08-162A
http://www.us-cert.gov/cas/techalerts/TA08-162A.html
CERT/CC vulnerability note: VU#878044
http://www.kb.cert.org/vuls/id/878044
BugTraq ID: 29623
http://www.securityfocus.com/bid/29623
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5785
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10820
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6414
http://secunia.com/advisories/33003
http://secunia.com/advisories/35463
http://www.vupen.com/english/advisories/2008/1797/references
http://www.vupen.com/english/advisories/2008/1800/references
http://www.vupen.com/english/advisories/2008/1801/references
http://www.vupen.com/english/advisories/2008/1836/references
http://www.vupen.com/english/advisories/2008/1981/references
http://www.vupen.com/english/advisories/2008/2971
http://www.vupen.com/english/advisories/2008/1787/references
http://www.vupen.com/english/advisories/2008/1788/references
http://www.vupen.com/english/advisories/2008/2361
http://www.securitytracker.com/id?1020218
http://secunia.com/advisories/30574
http://secunia.com/advisories/30596
http://secunia.com/advisories/30626
http://secunia.com/advisories/30647
http://secunia.com/advisories/30648
http://secunia.com/advisories/30665
http://secunia.com/advisories/30802
http://secunia.com/advisories/31334
http://secunia.com/advisories/31351
http://secunia.com/advisories/31467
http://secunia.com/advisories/31568
http://secunia.com/advisories/30612
http://secunia.com/advisories/30615
http://secunia.com/advisories/32664
http://securityreason.com/securityalert/3933
http://www.vupen.com/english/advisories/2009/1612
Common Vulnerability Exposure (CVE) ID: CVE-2008-2292
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239785-1
BugTraq ID: 29212
http://www.securityfocus.com/bid/29212
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11261
http://www.securitytracker.com/id?1020527
http://www.vupen.com/english/advisories/2008/1528/references
http://www.vupen.com/english/advisories/2008/2141/references
http://secunia.com/advisories/30187
http://secunia.com/advisories/31155
XForce ISS Database: netsnmp-snprintvalue-bo(42430)
http://xforce.iss.net/xforce/xfdb/42430
Common Vulnerability Exposure (CVE) ID: CVE-2008-4309
Bugtraq: 20081112 rPSA-2008-0315-1 net-snmp net-snmp-client net-snmp-server net-snmp-utils (Google Search)
http://www.securityfocus.com/archive/1/archive/1/498280/100/0/threaded
http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/tags/Ext-5-2-5-1/net-snmp/agent/snmp_agent.c?r1=17271&r2=17272&pathrev=17272
http://www.openwall.com/lists/oss-security/2008/10/31/1
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
http://lists.apple.com/archives/security-announce/2010//Dec/msg00001.html
http://security.gentoo.org/glsa/glsa-200901-15.xml
HPdes Security Advisory: HPSBMA02447
http://marc.info/?l=bugtraq&m=125017764422557&w=2
HPdes Security Advisory: SSRT090062
http://www.mandriva.com/security/advisories?name=MDVSA-2008:225
http://www.redhat.com/support/errata/RHSA-2008-0971.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-262908-1
SuSE Security Announcement: SUSE-SR:2009:003 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html
Cert/CC Advisory: TA09-133A
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
BugTraq ID: 32020
http://www.securityfocus.com/bid/32020
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6171
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6353
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9860
http://www.securitytracker.com/id?1021129
http://secunia.com/advisories/32539
http://secunia.com/advisories/33095
http://secunia.com/advisories/33746
http://secunia.com/advisories/35074
http://secunia.com/advisories/35679
http://www.vupen.com/english/advisories/2009/0301
http://www.vupen.com/english/advisories/2008/3400
http://www.vupen.com/english/advisories/2008/2973
http://secunia.com/advisories/32711
http://secunia.com/advisories/33631
http://secunia.com/advisories/32560
http://secunia.com/advisories/33821
http://www.vupen.com/english/advisories/2009/1297
http://www.vupen.com/english/advisories/2009/1771
XForce ISS Database: netsnmp-netsnmpcreatesubtreecache-dos(46262)
http://xforce.iss.net/xforce/xfdb/46262
CopyrightCopyright (c) 2008 E-Soft Inc. http://www.securityspace.com

This is only one of 32582 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.