Wind River Support Network

HomeOther DownloadsSecurity Advisory - Net-SNMP - CVE-2008-2292
Recommended Type: Patch

Security Advisory - Net-SNMP - CVE-2008-2292

Released: Jul 16, 2008     Updated: Jul 16, 2008

Description

Buffer overflow in the __snprint_value function in snmp_get in Net-SNMP 5.1.4, 5.2.4, and 5.4.1, as used in SNMP.xs for Perl, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large OCTETSTRING in an attribute value pair (AVP).

http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-2292 IDENTIFIER = WIND00124764


Product Version

Linux Platforms 2.0, Linux Platforms 1.x

Downloads


Installation Notes

Installation Notes

WIND00124765.zip for 1.4
WIND00124766.zip for 1.5
WIND00124767.zip for 2.0

1. Unzip the patch under [install_dir]/updates

2. Install the patch CD by entering the patch CD directory and run setup_linux.

3. This is a source only patch so you will have to build the kernel

4. Issue a make fs and make the kernel in a configured directory.

5. Upload the kernel and rootfs into the target and boot it up.


Live chat
Online