4 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:N/A:P
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.7 Medium
AI Score
Confidence
High
0.004 Low
EPSS
Percentile
74.5%
Debian Security Advisory DSA-4314-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
October 11, 2018 https://www.debian.org/security/faq
Package : net-snmp
CVE ID : CVE-2018-18065
Debian Bug : 910638
Magnus Klaaborg Stubman discovered a NULL pointer dereference bug in
net-snmp, a suite of Simple Network Management Protocol applications,
allowing a remote, authenticated attacker to crash the snmpd process
(causing a denial of service).
For the stable distribution (stretch), this problem has been fixed in
version 5.7.3+dfsg-1.7+deb9u1.
We recommend that you upgrade your net-snmp packages.
For the detailed security status of net-snmp please refer to its
security tracker page at:
https://security-tracker.debian.org/tracker/net-snmp
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 8 | all | tkmib | < 5.7.2.1+dfsg-1+deb8u2 | tkmib_5.7.2.1+dfsg-1+deb8u2_all.deb |
Debian | 9 | mips | libsnmp-perl | < 5.7.3+dfsg-1.7+deb9u1 | libsnmp-perl_5.7.3+dfsg-1.7+deb9u1_mips.deb |
Debian | 9 | i386 | libsnmp30-dbg | < 5.7.3+dfsg-1.7+deb9u1 | libsnmp30-dbg_5.7.3+dfsg-1.7+deb9u1_i386.deb |
Debian | 9 | all | net-snmp | < 5.7.3+dfsg-1.7+deb9u1 | net-snmp_5.7.3+dfsg-1.7+deb9u1_all.deb |
Debian | 8 | i386 | snmpd | < 5.7.2.1+dfsg-1+deb8u2 | snmpd_5.7.2.1+dfsg-1+deb8u2_i386.deb |
Debian | 9 | armhf | snmpd-dbgsym | < 5.7.3+dfsg-1.7+deb9u1 | snmpd-dbgsym_5.7.3+dfsg-1.7+deb9u1_armhf.deb |
Debian | 9 | armhf | libsnmp30 | < 5.7.3+dfsg-1.7+deb9u1 | libsnmp30_5.7.3+dfsg-1.7+deb9u1_armhf.deb |
Debian | 9 | armel | snmp-dbgsym | < 5.7.3+dfsg-1.7+deb9u1 | snmp-dbgsym_5.7.3+dfsg-1.7+deb9u1_armel.deb |
Debian | 8 | armel | snmpd | < 5.7.2.1+dfsg-1+deb8u2 | snmpd_5.7.2.1+dfsg-1+deb8u2_armel.deb |
Debian | 9 | ppc64el | libsnmp-perl-dbgsym | < 5.7.3+dfsg-1.7+deb9u1 | libsnmp-perl-dbgsym_5.7.3+dfsg-1.7+deb9u1_ppc64el.deb |
4 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:N/I:N/A:P
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.7 Medium
AI Score
Confidence
High
0.004 Low
EPSS
Percentile
74.5%