Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2015-5621 — Integer Overflow or Wraparound in Net-snmp
Severity
7.5HIGHNVD
OSV5.0
EPSS
17.8%
top 4.86%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedAug 19
Latest updateMay 14
Description
The snmp_pdu_parse function in snmp_api.c in net-snmp 5.7.2 and earlier does not remove the varBind variable in a netsnmp_variable_list item when parsing of the SNMP PDU fails, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6
Affected Packages4 packages
🔴Vulnerability Details
3💥Exploits & PoCs
1📋Vendor Advisories
4Red Hat
▶
Debian▶
CVE-2015-5621: net-snmp - The snmp_pdu_parse function in snmp_api.c in net-snmp 5.7.2 and earlier does not...↗2015
💬Community
4Bugzilla▶
CVE-2018-18065 net-snmp: NULL pointer exception in _set_key in agent/helpers/table_container.c resulting in a denial of service↗2018-10-09
Bugzilla▶
CVE-2018-18066 net-snmp: NULL pointer exception in snmp_oid_compare in snmplib/snmp_api.c resulting in a denial of service↗2018-10-09
Bugzilla▶
CVE-2018-1000116 net-snmp: Heap corruption in snmp_pdu_parse function in snmplib/snmp_api.c↗2018-03-07
Bugzilla▶
CVE-2015-5621 net-snmp: snmp_pdu_parse() incompletely parsed varBinds left in list of variables↗2015-04-16