The netsnmp_udp_fmtaddr function (snmplib/snmpUDPDomain.c) in net-snmp 5.0.9 through 5.4.2.1, when using TCP wrappers for client authorization, does not properly parse hosts.allow rules, which allows remote attackers to bypass intended access restrictions and execute SNMP queries, related to "source/destination IP address confusion."
https://bugzilla.redhat.com/show_bug.cgi?id=485211
http://www.redhat.com/support/errata/RHSA-2009-0295.html
http://www.openwall.com/lists/oss-security/2009/02/12/7
http://www.openwall.com/lists/oss-security/2009/02/12/4
http://www.openwall.com/lists/oss-security/2009/02/12/2
http://net-snmp.svn.sourceforge.net/viewvc/net-snmp?view=rev&revision=17367
http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html
Published: 2009-02-12
Updated: 2024-11-21
Base Score: 5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N
Severity: Medium
Base Score: 5.3
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Severity: Medium
Base Score: 4.8
Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
Severity: Medium