CVE-2008-6123

The netsnmp_udp_fmtaddr function (snmplib/snmpUDPDomain.c) in net-snmp 5.0.9 through 5.4.2.1, when using TCP wrappers for client authorization, does not properly parse hosts.allow rules, which allows remote attackers to bypass intended access restrictions and execute SNMP queries, related to "source/destination IP address confusion."
References
Link Resource
http://bugs.gentoo.org/show_bug.cgi?id=250429 Exploit Issue Tracking
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html Mailing List
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html Mailing List
http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00003.html Mailing List
http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/trunk/net-snmp/snmplib/snmpUDPDomain.c?r1=17325&r2=17367&pathrev=17367 Product
http://net-snmp.svn.sourceforge.net/viewvc/net-snmp?view=rev&revision=17367 Product
http://secunia.com/advisories/34499 Broken Link
http://secunia.com/advisories/35416 Broken Link
http://secunia.com/advisories/35685 Broken Link
http://www.openwall.com/lists/oss-security/2009/02/12/2 Mailing List
http://www.openwall.com/lists/oss-security/2009/02/12/4 Mailing List
http://www.openwall.com/lists/oss-security/2009/02/12/7 Mailing List
http://www.redhat.com/support/errata/RHSA-2009-0295.html Not Applicable
http://www.securitytracker.com/id?1021921 Broken Link Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=485211 Issue Tracking Patch
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10289 Broken Link
http://bugs.gentoo.org/show_bug.cgi?id=250429 Exploit Issue Tracking
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html Mailing List
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html Mailing List
http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00003.html Mailing List
http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/trunk/net-snmp/snmplib/snmpUDPDomain.c?r1=17325&r2=17367&pathrev=17367 Product
http://net-snmp.svn.sourceforge.net/viewvc/net-snmp?view=rev&revision=17367 Product
http://secunia.com/advisories/34499 Broken Link
http://secunia.com/advisories/35416 Broken Link
http://secunia.com/advisories/35685 Broken Link
http://www.openwall.com/lists/oss-security/2009/02/12/2 Mailing List
http://www.openwall.com/lists/oss-security/2009/02/12/4 Mailing List
http://www.openwall.com/lists/oss-security/2009/02/12/7 Mailing List
http://www.redhat.com/support/errata/RHSA-2009-0295.html Not Applicable
http://www.securitytracker.com/id?1021921 Broken Link Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=485211 Issue Tracking Patch
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10289 Broken Link
Configurations

Configuration 1 (hide)

cpe:2.3:a:net-snmp:net-snmp:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:opensuse:10.3-11.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise:9-11:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:redhat:enterprise_linux:3.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2009-02-12 16:30

Updated : 2025-04-09 00:30


NVD link : CVE-2008-6123

Mitre link : CVE-2008-6123

CVE.ORG link : CVE-2008-6123


JSON object : View

Products Affected

opensuse

  • opensuse

net-snmp

  • net-snmp

suse

  • linux_enterprise

redhat

  • enterprise_linux
CWE
CWE-863

Incorrect Authorization