Subject: | |
From: | |
Reply To: | |
Date: | Fri, 27 Mar 2009 13:48:15 -0500 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
Synopsis: Moderate: net-snmp security update
Issue date: 2009-03-26
CVE Names: CVE-2008-6123
It was discovered that the snmpd daemon did not use TCP wrappers
correctly, causing network hosts access restrictions defined in
"/etc/hosts.allow" and "/etc/hosts.deny" to not be honored. A remote
attacker could use this flaw to bypass intended access restrictions.
(CVE-2008-6123)
This issue only affected configurations where hosts.allow and hosts.deny
were used to limit access to the SNMP server. To obtain information from
the server, the attacker would have to successfully authenticate,
usually by providing a correct community string.
After installing the update, the snmpd and snmptrapd daemons will be
restarted automatically.
SL 3.0.x
SRPMS:
net-snmp-5.0.9-2.30E.27.src.rpm
i386:
net-snmp-5.0.9-2.30E.27.i386.rpm
net-snmp-devel-5.0.9-2.30E.27.i386.rpm
net-snmp-libs-5.0.9-2.30E.27.i386.rpm
net-snmp-perl-5.0.9-2.30E.27.i386.rpm
net-snmp-utils-5.0.9-2.30E.27.i386.rpm
x86_64:
net-snmp-5.0.9-2.30E.27.x86_64.rpm
net-snmp-devel-5.0.9-2.30E.27.x86_64.rpm
net-snmp-libs-5.0.9-2.30E.27.i386.rpm
net-snmp-libs-5.0.9-2.30E.27.x86_64.rpm
net-snmp-perl-5.0.9-2.30E.27.x86_64.rpm
net-snmp-utils-5.0.9-2.30E.27.x86_64.rpm
-Connie Sieh
-Troy Dawson
|
|
|