Denial of Service in Net-SNMP (Aktualisierung)
ID: | USN-3792-2 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 12.04 ESM |
Datum: | Di, 16. Oktober 2018, 18:37 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18065 |
Applikationen: | Net-SNMP |
Update von: | Denial of Service in Net-SNMP |
Originalnachricht |
|
--===============7127757352381165412== Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="=-Ra1qKkaFEDb9i52lXfub" --=-Ra1qKkaFEDb9i52lXfub Content-Type: text/plain; charset="UTF-8 Content-Transfer-Encoding: quoted-printable ========================================================================== Ubuntu Security Notice USN-3792-2 October 16, 2018 net-snmp vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 ESM Summary: Net-SNMP could be made to crash if it received specially crafted network traffic. Software Description: - net-snmp: SNMP (Simple Network Management Protocol) server and applications Details: USN-3792-1 fixed a vulnerability in Net-SNMP. This update provides the corresponding update for Ubuntu 12.04 ESM. Original advisory details: It was discovered that Net-SNMP incorrectly handled certain certain crafted packets. A remote attacker could possibly use this issue to cause Net-SNMP to crash, resulting in a denial of service. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 ESM: libsnmp15 5.4.3~dfsg-2.4ubuntu1.4 In general, a standard system update will make all the necessary changes. References: https://usn.ubuntu.com/usn/usn-3792-2 https://usn.ubuntu.com/usn/usn-3792-1 CVE-2018-18065 --=-Ra1qKkaFEDb9i52lXfub Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part Content-Transfer-Encoding: 7bit -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAABCAAGBQJbxdUwAAoJEEW851uECx9pfv4P/3yj8vDuakmJpg6jeoDlcx7J dnRXlGf6vhML0Vnxzl8ywl+HSn3nUKK7YV51BgNyohRchFN1xCYaOAck+bCD890i EEe3ypBwusg9RxvAty2ivQ8wjipzZI1nVcoEYo21qqMHJi+9wCATprgS3apdaCT/ 8mNkB7zgCUaFfFKex8+RTBH33h+t/2DPSnPJUDSVWu1AhIsKnaP6KJ7YPAyDEQcK unsYC90LFTxGhHXriVjpts5+i5vE2tFE27h4Xz7h5WuEyCd788al17XSfiZje3wb 7XjO0Jvn+Yi9pg6nUbqKi+Lh0Pq/hjKZWqPA/ubaxuykwI8DLqVnNzb3Xcb1uRil RjKMW8smkvGkm5E5wEJUEqWaAUA9ESUUD4odeldFDkb3juomAusAhkCWB4JbuZzH xZxceJ2V/HvGcZISX+gOf+K4g/W3H5eD3MQLcl1Nvz8M8TGsMri56DtbX9VE+AJm XAWP5FWv3SZQKbiGy6UweisQ4+6kjVgjnXn3IeNBGj1LSqODBE7TIv2fP18dOukg Vf9xG76lfvWKMGrUcznrzBaYKyhN5ipEIKnmuj1fb1BsxjYdruZJUc4Js358q5q8 fi+jbT5cFSdCNU7cwT/VL3Mw5Chfhlos/N6sdmN+iOz3makhydV9HhDq4bBi6U5B kH3ZZG7ZG3OaiUU5qyFQ =3T6n -----END PGP SIGNATURE----- --=-Ra1qKkaFEDb9i52lXfub-- --===============7127757352381165412== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK --===============7127757352381165412==-- |