Gentoo Archives: gentoo-announce

From: Robert Buchholz <rbu@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200808-02 ] Net-SNMP: Multiple vulnerabilities
Date: Wed, 06 Aug 2008 00:38:19
Message-Id: 200808060230.05828.rbu@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200808-02
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Net-SNMP: Multiple vulnerabilities
9 Date: August 06, 2008
10 Bugs: #222265, #225105
11 ID: 200808-02
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Multiple vulnerabilities in Net-SNMP allow for authentication bypass in
19 snmpd and execution of arbitrary code in Perl applications using
20 Net-SMNP.
21
22 Background
23 ==========
24
25 Net-SNMP is a collection of tools for generating and retrieving SNMP
26 data. The SNMPv3 protocol uses a keyed-Hash Message Authentication Code
27 (HMAC) to verify data integrity and authenticity of SNMP messages.
28
29 Affected packages
30 =================
31
32 -------------------------------------------------------------------
33 Package / Vulnerable / Unaffected
34 -------------------------------------------------------------------
35 1 net-analyzer/net-snmp < 5.4.1.1 >= 5.4.1.1
36
37 Description
38 ===========
39
40 Wes Hardaker reported that the SNMPv3 HMAC verification relies on the
41 client to specify the HMAC length (CVE-2008-0960). John Kortink
42 reported a buffer overflow in the Perl bindings of Net-SNMP when
43 processing the OCTETSTRING in an attribute value pair (AVP) received by
44 an SNMP agent (CVE-2008-2292).
45
46 Impact
47 ======
48
49 An attacker could send SNMPv3 packets to an instance of snmpd providing
50 a valid user name and an HMAC length value of 1, and easily conduct
51 brute-force attacks to bypass SNMP authentication. An attacker could
52 further entice a user to connect to a malicious SNMP agent with an SNMP
53 client using the Perl bindings, possibly resulting in the execution of
54 arbitrary code.
55
56 Workaround
57 ==========
58
59 There is no known workaround at this time.
60
61 Resolution
62 ==========
63
64 All Net-SNMP users should upgrade to the latest version:
65
66 # emerge --sync
67 # emerge --ask --oneshot --verbose ">=net-analyzer/net-snmp-5.4.1.1"
68
69 References
70 ==========
71
72 [ 1 ] CVE-2008-0960
73 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960
74 [ 2 ] CVE-2008-2292
75 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2292
76
77 Availability
78 ============
79
80 This GLSA and any updates to it are available for viewing at
81 the Gentoo Security Website:
82
83 http://security.gentoo.org/glsa/glsa-200808-02.xml
84
85 Concerns?
86 =========
87
88 Security is a primary focus of Gentoo Linux and ensuring the
89 confidentiality and security of our users machines is of utmost
90 importance to us. Any security concerns should be addressed to
91 security@g.o or alternatively, you may file a bug at
92 http://bugs.gentoo.org.
93
94 License
95 =======
96
97 Copyright 2008 Gentoo Foundation, Inc; referenced text
98 belongs to its owner(s).
99
100 The contents of this document are licensed under the
101 Creative Commons - Attribution / Share Alike license.
102
103 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature