SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Intrusion Detection)  >   IBM Security Network IPS Vendors:   IBM
(IBM Issues Fix for IBM Security Network IPS) Net-snmp Incomplete Parsing in snmp_pdu_parse() Lets Remote Users Crash snmpd or Execute Arbitrary Code
SecurityTracker Alert ID:  1033865
SecurityTracker URL:  http://securitytracker.com/id/1033865
CVE Reference:   CVE-2015-5621   (Links to External Site)
Date:  Oct 19 2015
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 4.3, 4.4, 4.5, 4.6, 4.6.1, 4.6.2
Description:   A vulnerability was reported in Net-snmp. A remote user can cause the target service to crash. A remote user can execute arbitrary code on the target system. IBM Security Network IPS is affected.

A remote user can send specially crafted data to trigger a parsing error in snmp_pdu_parse() and cause the target snmpd process to crash or execute arbitrary code on the target system. The code will run with the privileges of the target snmp service.

Qinghao Tang of QIHU 360, China, reported this vulnerability.

Impact:   A remote user can cause the target service to crash.

A remote user can execute arbitrary code on the target system.

Solution:   IBM has issued a fix for IBM Security Network IPS.

The IBM advisory is available at:

https://www-304.ibm.com/support/docview.wss?uid=swg21966694

Vendor URL:  www-304.ibm.com/support/docview.wss?uid=swg21966694 (Links to External Site)
Cause:   Access control error

Message History:   This archive entry is a follow-up to the message listed below.
Aug 18 2015 Net-snmp Incomplete Parsing in snmp_pdu_parse() Lets Remote Users Crash snmpd or Execute Arbitrary Code



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, SecurityGlobal.net LLC