net-snmp provides various tools relating to the Simple Network Management Protocol. Prior to version 5.9.2, a malformed OID in a SET request to SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable
can cause an out-of-bounds memory access. A user with read-write credentials can exploit the issue. Version 5.9.2 contains a patch. Users should use strong SNMPv3 credentials and avoid sharing the credentials. Those who must use SNMPv1 or SNMPv2c should use a complex community string and enhance the protection by restricting access to a given IP address range.
{ "vanir_signatures": [ { "digest": { "threshold": 0.9, "line_hashes": [ "93481678995860343014821550952925501709", "329883609409088984877513160836570993697", "90996168828839817641143191009250748746", "84715928341168886370472531770984568572" ] }, "id": "CVE-2022-24807-38d73094", "source": "https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937", "signature_type": "Line", "signature_version": "v1", "target": { "file": "agent/mibgroup/mibII/vacm_vars.c" }, "deprecated": false }, { "digest": { "function_hash": "42328859980840848703049083694783789413", "length": 4486.0 }, "id": "CVE-2022-24807-6693254c", "source": "https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937", "signature_type": "Function", "signature_version": "v1", "target": { "file": "agent/mibgroup/agent/nsVacmAccessTable.c", "function": "nsVacmAccessTable_handler" }, "deprecated": false }, { "digest": { "threshold": 0.9, "line_hashes": [ "101705815906469133529599957598608078925", "118536710121215357800279261873153586760", "76046262169075458752936054848008587493", "208453342658565314658233108540818746089", "123641821933806846028751834794904150686", "101705815906469133529599957598608078925", "266017915174389378972949351611408207840", "174172268129687264723675784256469245016", "193473216283755631885302533396112057238", "135622840203460710109084437991526085403", "104909031685728238587798713337917481078", "52294072460638860849608500565980364202", "123641821933806846028751834794904150686", "330272572276198096952265186781298889541", "114147104779263570726863758453786574611", "270090253713972384606015251073484123519", "199388456969406388637798506744447315283", "5223774676679683017950071917146984374", "99862687578825556437428992220799198473", "37229377190004587475133905276553638305", "85360771265516875339456466166751522892", "123641821933806846028751834794904150686" ] }, "id": "CVE-2022-24807-83606bb4", "source": "https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937", "signature_type": "Line", "signature_version": "v1", "target": { "file": "agent/mibgroup/agent/nsVacmAccessTable.c" }, "deprecated": false }, { "digest": { "function_hash": "199964159541358252145240204005079024052", "length": 3340.0 }, "id": "CVE-2022-24807-98a0895f", "source": "https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937", "signature_type": "Function", "signature_version": "v1", "target": { "file": "agent/mibgroup/snmpv3/usmUser.c", "function": "write_usmUserStatus" }, "deprecated": false }, { "digest": { "threshold": 0.9, "line_hashes": [ "289161301384971360487741187332433544387", "117147511563233464147479629295932571801", "164548836578273264233821198389692432198", "321389477694282802299858719753239225377", "136440181962252683631310067296458462692", "122575508272880746612488523363151570574", "164548836578273264233821198389692432198", "309869416733132685266140377079494838913", "289161301384971360487741187332433544387", "117147511563233464147479629295932571801", "164548836578273264233821198389692432198", "136370859928119373804431189880326048574" ] }, "id": "CVE-2022-24807-cceb5399", "source": "https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937", "signature_type": "Line", "signature_version": "v1", "target": { "file": "agent/mibgroup/agent/nsLogging.c" }, "deprecated": false }, { "digest": { "function_hash": "118375497292323459652607233435155316096", "length": 1178.0 }, "id": "CVE-2022-24807-d58d5dff", "source": "https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937", "signature_type": "Function", "signature_version": "v1", "target": { "file": "agent/mibgroup/mibII/vacm_vars.c", "function": "access_parse_oid" }, "deprecated": false }, { "digest": { "threshold": 0.9, "line_hashes": [ "211813956712650590200040513516643867245", "200198644239406403094222802618935448258", "246045345096052309312675647210938041228", "298070543415549770613339386595090320174", "275165604706423187201154191902748746246" ] }, "id": "CVE-2022-24807-e04fd8d8", "source": "https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937", "signature_type": "Line", "signature_version": "v1", "target": { "file": "agent/mibgroup/snmpv3/usmUser.c" }, "deprecated": false }, { "digest": { "function_hash": "183393581433958351977344098104352299955", "length": 5403.0 }, "id": "CVE-2022-24807-f32bf120", "source": "https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937", "signature_type": "Function", "signature_version": "v1", "target": { "file": "agent/mibgroup/agent/nsLogging.c", "function": "handle_nsLoggingTable" }, "deprecated": false } ] }