Upstream information

CVE-2005-2177 at MITRE

Description

Net-SNMP 5.0.x before 5.0.10.2, 5.2.x before 5.2.1.2, and 5.1.3, when net-snmp is using stream sockets such as TCP, allows remote attackers to cause a denial of service (daemon hang and CPU consumption) via a TCP packet of length 1, which triggers an infinite loop.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 5
Vector AV:N/AC:L/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
SUSE Bugzilla entries: 224184 [RESOLVED / INVALID], 263762 [RESOLVED / FIXED], 96326 [RESOLVED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
Novell Linux Desktop 9 for x86
Novell Linux Desktop 9 for x86_64
Open Enterprise Server
  • net-snmp >= 5.1-80.22
suse91.s390
sles9-oes.x86
suse91.x86-64
suse91.ia64
suse91.ppc
YOU Patch Nr: 10529
SUSE LINUX 10.0
  • net-snmp >= 5.2.1-10.2
SUSE LINUX 9.1 for IA32
SUSE LINUX 9.1 for x86-64
  • net-snmp >= 5.1-80.22
SUSE LINUX 9.2
  • net-snmp >= 5.1.2-3.2
SUSE LINUX 9.3
  • net-snmp >= 5.2.1-5.2
SUSE LINUX 10.0
  • net-snmp >= 5.2.1-10.5
  • net-snmp-devel >= 5.2.1-10.5
SUSE LINUX 9.3
  • net-snmp >= 5.2.1-5.5
  • net-snmp-devel >= 5.2.1-5.5