SCIENTIFIC-LINUX-ERRATA Archives

March 2009

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Troy Dawson <[log in to unmask]>
Reply To:
Troy Dawson <[log in to unmask]>
Date:
Fri, 27 Mar 2009 13:48:15 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (39 lines)
Synopsis:	Moderate: net-snmp security update
Issue date:	2009-03-26
CVE Names:	CVE-2008-6123

It was discovered that the snmpd daemon did not use TCP wrappers 
correctly, causing network hosts access restrictions defined in 
"/etc/hosts.allow" and "/etc/hosts.deny" to not be honored. A remote 
attacker could use this flaw to bypass intended access restrictions. 
(CVE-2008-6123)

This issue only affected configurations where hosts.allow and hosts.deny
were used to limit access to the SNMP server. To obtain information from
the server, the attacker would have to successfully authenticate, 
usually by providing a correct community string.

After installing the update, the snmpd and snmptrapd daemons will be 
restarted automatically.

SL 3.0.x

      SRPMS:
net-snmp-5.0.9-2.30E.27.src.rpm
      i386:
net-snmp-5.0.9-2.30E.27.i386.rpm
net-snmp-devel-5.0.9-2.30E.27.i386.rpm
net-snmp-libs-5.0.9-2.30E.27.i386.rpm
net-snmp-perl-5.0.9-2.30E.27.i386.rpm
net-snmp-utils-5.0.9-2.30E.27.i386.rpm
      x86_64:
net-snmp-5.0.9-2.30E.27.x86_64.rpm
net-snmp-devel-5.0.9-2.30E.27.x86_64.rpm
net-snmp-libs-5.0.9-2.30E.27.i386.rpm
net-snmp-libs-5.0.9-2.30E.27.x86_64.rpm
net-snmp-perl-5.0.9-2.30E.27.x86_64.rpm
net-snmp-utils-5.0.9-2.30E.27.x86_64.rpm

-Connie Sieh
-Troy Dawson

ATOM RSS1 RSS2