Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-44792
HistoryNov 07, 2022 - 12:00 a.m.

CVE-2022-44792

2022-11-0700:00:00
ubuntu.com
ubuntu.com
16
net-snmp 5.8
5.9.3
handle_ipdefaultttl
ip-mib
ip_scalars.c
null pointer exception
remote attacker
denial of service
crafted udp packet

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

0.003 Low

EPSS

Percentile

71.0%

handle_ipDefaultTTL in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.8
through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote
attacker (who has write access) to cause the instance to crash via a
crafted UDP packet, resulting in Denial of Service.

Bugs

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchnet-snmp< 5.7.3+dfsg-1.8ubuntu3.8UNKNOWN
ubuntu20.04noarchnet-snmp< 5.8+dfsg-2ubuntu2.6UNKNOWN
ubuntu22.04noarchnet-snmp< 5.9.1+dfsg-1ubuntu2.4UNKNOWN
ubuntu22.10noarchnet-snmp< 5.9.3+dfsg-1ubuntu1.2UNKNOWN
ubuntu23.04noarchnet-snmp< 5.9.3+dfsg-1ubuntu4UNKNOWN
ubuntu14.04noarchnet-snmp< 5.7.2~dfsg-8.1ubuntu3.3+esm3UNKNOWN
ubuntu16.04noarchnet-snmp< 5.7.3+dfsg-1ubuntu4.6+esm1UNKNOWN

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

0.003 Low

EPSS

Percentile

71.0%