CVE-2014-2285Improper Input Validation in Net-snmp

Severity
4.3MEDIUMNVD
EPSS
3.1%
top 13.15%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 27
Latest updateMay 17

Description

The perl_trapd_handler function in perl/TrapReceiver/TrapReceiver.xs in Net-SNMP 5.7.3.pre3 and earlier, when using certain Perl versions, allows remote attackers to cause a denial of service (snmptrapd crash) via an empty community string in an SNMP trap, which triggers a NULL pointer dereference within the newSVpv function in Perl.

CVSS vector

AV:N/AC:M/C:N/I:N/A:PExploitability: 8.6 | Impact: 2.9

Affected Packages3 packages

debiandebian/net-snmp< net-snmp 5.7.2.1~dfsg-3 (bookworm)
Debiannet-snmp/net-snmp< 5.7.2.1~dfsg-3+3

🔴Vulnerability Details

2
GHSA
GHSA-vjgw-84x2-wchq: The perl_trapd_handler function in perl/TrapReceiver/TrapReceiver2022-05-17
OSV
CVE-2014-2285: The perl_trapd_handler function in perl/TrapReceiver/TrapReceiver2014-04-27

📋Vendor Advisories

3
Ubuntu
Net-SNMP vulnerabilities2014-04-14
Red Hat
net-snmp: snmptrapd crash when using a trap with empty community string2014-03-03
Debian
CVE-2014-2285: net-snmp - The perl_trapd_handler function in perl/TrapReceiver/TrapReceiver.xs in Net-SNMP...2014

💬Community

1
Bugzilla
CVE-2014-2285 net-snmp: snmptrapd crash when using a trap with empty community string2014-03-05