CVE-2018-18065
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
08/10/2018
Last modified:
16/10/2019
Description
_set_key in agent/helpers/table_container.c in Net-SNMP before 5.8 has a NULL Pointer Exception bug that can be used by an authenticated attacker to remotely cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Base Score 2.0
4.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:net-snmp:net-snmp:*:*:*:*:*:*:*:* | 5.8 (excluding) | |
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:* | ||
cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:* | ||
cpe:2.3:a:netapp:hyper_converged_infrastructure:-:*:*:*:*:*:*:* | ||
cpe:2.3:a:netapp:storagegrid_webscale:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:netapp:data_ontap:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:* | 11.0 (including) | 11.5 (including) |
cpe:2.3:o:netapp:solidfire_element_os:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* | 7.1.22 (including) | |
cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* | 7.1.23 (including) | 8.0.15 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.securityfocus.com/bid/106265
- https://cert-portal.siemens.com/productcert/pdf/ssa-978220.pdf
- https://dumpco.re/blog/net-snmp-5.7.3-remote-dos
- https://security.netapp.com/advisory/ntap-20181107-0001/
- https://security.paloaltonetworks.com/CVE-2018-18065
- https://sourceforge.net/p/net-snmp/code/ci/7ffb8e25a0db851953155de91f0170e9bf8c457d/
- https://usn.ubuntu.com/3792-1/
- https://usn.ubuntu.com/3792-2/
- https://usn.ubuntu.com/3792-3/
- https://www.debian.org/security/2018/dsa-4314
- https://www.exploit-db.com/exploits/45547/
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html