GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Wed Jan 13, 2010 11:26 pm Post subject: [ GLSA 201001-05 ] net-snmp: Authorization bypass |
|
|
Gentoo Linux Security Advisory
Title: net-snmp: Authorization bypass (GLSA 201001-05)
Severity: normal
Exploitable: remote
Date: January 13, 2010
Bug(s): #250429
ID: 201001-05
Synopsis
A remote attacker can bypass the tcp-wrappers client authorization in
net-snmp.
Background
net-snmp bundles software for generating and retrieving SNMP data.
Affected Packages
Package: net-analyzer/net-snmp
Vulnerable: < 5.4.2.1-r1
Unaffected: >= 5.4.2.1-r1
Architectures: All supported architectures
Description
The netsnmp_udp_fmtaddr() function (snmplib/snmpUDPDomain.c), when
using TCP wrappers for client authorization, does not properly parse
hosts.allow rules.
Impact
A remote, unauthenticated attacker could bypass the ACL filtering,
possibly resulting in the execution of arbitrary SNMP queries.
Workaround
If possible, protect net-snmp with custom iptables rules:
Code: |
iptables -s [client] -d [host] -p udp --dport 161 -j ACCEPT
iptables -s 0.0.0.0/0 -d [host] -p udp --dport 161 -j DROP |
Resolution
All net-snmp users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=net-analyzer/net-snmp-5.4.2.1-r1" |
References
CVE-2008-6123 |
|