CVE-2022-44792

NameCVE-2022-44792
Descriptionhandle_ipDefaultTTL in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.8 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker (who has write access) to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3270-1
Debian Bugs1024020

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
net-snmp (PTS)buster5.7.3+dfsg-5+deb10u2vulnerable
buster (security)5.7.3+dfsg-5+deb10u4fixed
bullseye (security), bullseye5.9+dfsg-4+deb11u1vulnerable
bookworm5.9.3+dfsg-2fixed
trixie5.9.4+dfsg-1fixed
sid5.9.4+dfsg-1.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
net-snmpsourcebuster5.7.3+dfsg-5+deb10u4DLA-3270-1
net-snmpsource(unstable)5.9.3+dfsg-21024020

Notes

[bullseye] - net-snmp <no-dsa> (Minor issue)
https://github.com/net-snmp/net-snmp/issues/474
https://gist.github.com/menglong2234/b7bc13ae1a144f47cc3c95a7ea062428
https://github.com/net-snmp/net-snmp/commit/be804106fd0771a7d05236cff36e199af077af57

Search for package or bug name: Reporting problems