Vulnerabilities > CVE-2012-2141 - Denial of Service vulnerability in Net-Snmp 5.7.1

047910
CVSS 3.5 - LOW
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
SINGLE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
net-snmp
nessus

Summary

Array index error in the handle_nsExtendOutput2Table function in agent/mibgroup/agent/extend.c in Net-SNMP 5.7.1 allows remote authenticated users to cause a denial of service (out-of-bounds read and snmpd crash) via an SNMP GET request for an entry not in the extension table.

Vulnerable Configurations

Part Description Count
Application
Net-Snmp
1

Nessus

  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2013-0124.NASL
    descriptionUpdated net-snmp packages that fix one security issue and multiple bugs are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. These packages provide various libraries and tools for the Simple Network Management Protocol (SNMP). An out-of-bounds buffer read flaw was found in the net-snmp agent. A remote attacker with read privileges to a Management Information Base (MIB) subtree handled by the
    last seen2020-06-01
    modified2020-06-02
    plugin id63569
    published2013-01-17
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/63569
    titleCentOS 5 : net-snmp (CESA-2013:0124)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2012-299.NASL
    descriptionSNMP GET request involving on a non-existent extension table entry could crash snmpd
    last seen2020-06-05
    modified2014-06-13
    plugin id74638
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/74638
    titleopenSUSE Security Update : net-snmp (openSUSE-SU-2012:0659-1)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20120620_NET_SNMP_ON_SL6_X.NASL
    descriptionThe net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. An array index error, leading to an out-of-bounds buffer read flaw, was found in the way the net-snmp agent looked up entries in the extension table. A remote attacker with read privileges to a Management Information Base (MIB) subtree handled by the
    last seen2020-03-18
    modified2012-08-01
    plugin id61342
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/61342
    titleScientific Linux Security Update : net-snmp on SL6.x i386/x86_64 (20120620)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_LIBSNMP15-120709.NASL
    descriptionThis update to net-snmp resolves the following issues : - Specially crafted SNMP GET requests could cause a denial of service (application crash) via a heap-based out-out-bounds read flaw which could be exploited remotely. (CVE-2012-2141) - The snmpd agent should read shared memory information from /proc/meminfo when running on Linux Kernel 2.6 or newer. (bnc#762887) - The snmpd agent could crash when an AgentX sub-agent disconnects in the middle of a request. (bnc#670789) - After rotating the net-snmp log file, use
    last seen2020-06-05
    modified2013-01-25
    plugin id64194
    published2013-01-25
    reporterThis script is Copyright (C) 2013-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/64194
    titleSuSE 11.1 Security Update : net-snmp (SAT Patch Number 6517)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2013-0124.NASL
    descriptionFrom Red Hat Security Advisory 2013:0124 : Updated net-snmp packages that fix one security issue and multiple bugs are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. These packages provide various libraries and tools for the Simple Network Management Protocol (SNMP). An out-of-bounds buffer read flaw was found in the net-snmp agent. A remote attacker with read privileges to a Management Information Base (MIB) subtree handled by the
    last seen2020-06-01
    modified2020-06-02
    plugin id68695
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68695
    titleOracle Linux 5 : net-snmp (ELSA-2013-0124)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2013-049.NASL
    descriptionA vulnerability has been discovered and corrected in net-snmp : An array index error, leading to out-of heap-based buffer read flaw was found in the way net-snmp agent performed entries lookup in the extension table. When certain MIB subtree was handled by the extend directive, a remote attacker having read privilege to the subtree could use this flaw to cause a denial of service (snmpd crash) via SNMP GET request involving a non-existent extension table entry (CVE-2012-2141). The updated packages have been patched to correct this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id66063
    published2013-04-20
    reporterThis script is Copyright (C) 2013-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/66063
    titleMandriva Linux Security Advisory : net-snmp (MDVSA-2013:049)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2012-16659.NASL
    descriptionThis update fixes : - Array index error, leading to out-of heap-based buffer read (CVE-2012-2141) - Size values in hrStorageTable and hrFSTable. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2012-10-31
    plugin id62766
    published2012-10-31
    reporterThis script is Copyright (C) 2012-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/62766
    titleFedora 16 : net-snmp-5.7.1-3.fc16 (2012-16659)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2012-0876.NASL
    descriptionUpdated net-snmp packages that fix one security issue and multiple bugs are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. An array index error, leading to an out-of-bounds buffer read flaw, was found in the way the net-snmp agent looked up entries in the extension table. A remote attacker with read privileges to a Management Information Base (MIB) subtree handled by the
    last seen2020-06-01
    modified2020-06-02
    plugin id59592
    published2012-06-20
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/59592
    titleRHEL 6 : net-snmp (RHSA-2012:0876)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_NET-SNMP-8153.NASL
    descriptionThis update to net-snmp resolves the following issues : - Specially crafted SNMP GET requests could cause a denial of service (application crash) via a heap-based out-out-bounds read flaw which could be exploited remotely. (CVE-2012-2141) - After rotating the net-snmp log file, use
    last seen2020-06-05
    modified2012-07-19
    plugin id60060
    published2012-07-19
    reporterThis script is Copyright (C) 2012-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/60060
    titleSuSE 10 Security Update : net-snmp (ZYPP Patch Number 8153)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2012-16662.NASL
    descriptionThis update fixes : - Array index error, leading to out-of heap-based buffer read (CVE-2012-2141) - Size values in hrStorageTable and hrFSTable. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2012-10-31
    plugin id62767
    published2012-10-31
    reporterThis script is Copyright (C) 2012-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/62767
    titleFedora 17 : net-snmp-5.7.1-5.fc17 (2012-16662)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2013-0124.NASL
    descriptionUpdated net-snmp packages that fix one security issue and multiple bugs are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. These packages provide various libraries and tools for the Simple Network Management Protocol (SNMP). An out-of-bounds buffer read flaw was found in the net-snmp agent. A remote attacker with read privileges to a Management Information Base (MIB) subtree handled by the
    last seen2020-06-01
    modified2020-06-02
    plugin id63407
    published2013-01-08
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/63407
    titleRHEL 5 : net-snmp (RHSA-2013:0124)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-1450-1.NASL
    descriptionIt was discovered that Net-SNMP incorrectly performed entry lookups in the extension table. A remote attacker could send a specially crafted request and cause the SNMP server to crash, leading to a denial of service. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id59254
    published2012-05-24
    reporterUbuntu Security Notice (C) 2012-2019 Canonical, Inc. / NASL script (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/59254
    titleUbuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 / 12.04 LTS : net-snmp vulnerability (USN-1450-1)
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS11_NET-SNMP_20141216.NASL
    descriptionThe remote Solaris system is missing necessary patches to address security updates : - The perl_trapd_handler function in perl/TrapReceiver/TrapReceiver.xs in Net-SNMP 5.7.3.pre3 and earlier, when using certain Perl versions, allows remote attackers to cause a denial of service (snmptrapd crash) via an empty community string in an SNMP trap, which triggers a NULL pointer dereference within the newSVpv function in Perl. (CVE-2014-2285) - snmplib/mib.c in net-snmp 5.7.0 and earlier, when the -OQ option is used, allows remote attackers to cause a denial of service (snmptrapd crash) via a crafted SNMP trap message, which triggers a conversion to the variable type designated in the MIB file, as demonstrated by a NULL type in an ifMtu trap message. (CVE-2014-3565)
    last seen2020-06-01
    modified2020-06-02
    plugin id80708
    published2015-01-19
    reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/80708
    titleOracle Solaris Third-Party Patch Update : net-snmp (cve_2012_2141_denial_of)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2012-0876.NASL
    descriptionFrom Red Hat Security Advisory 2012:0876 : Updated net-snmp packages that fix one security issue and multiple bugs are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. An array index error, leading to an out-of-bounds buffer read flaw, was found in the way the net-snmp agent looked up entries in the extension table. A remote attacker with read privileges to a Management Information Base (MIB) subtree handled by the
    last seen2020-06-01
    modified2020-06-02
    plugin id68556
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68556
    titleOracle Linux 6 : net-snmp (ELSA-2012-0876)
  • NASL familyMisc.
    NASL idCITRIX_NETSCALER_ADC_MULTIPLE.NASL
    descriptionThe remote Citrix NetScaler version is affected by multiple vulnerabilities : - A denial of service vulnerability in the VM Virtual Machine Daemon. Please note that this particular vulnerability does not apply to Citrix NetScaler 10.1. (CVE-2013-6938) - A denial of service vulnerability in the Application Delivery Controller RADIUS authentication. (CVE-2013-6939) - An authenticated denial of service in the SNMP daemon. (CVE-2012-2142) - An unspecified authentication disclosure in the Application Delivery Controller. (CVE-2013-6940) - An unspecified shell breakout in the Application Delivery Controller firmware. (CVE-2013-6941) - An unspecified LDAP username injection vulnerability in the Application Delivery Controller. (CVE-2013-6943) - A cross-site scripting vulnerability in the AAA TM vServer user interface. (CVE-2013-6944)
    last seen2020-06-01
    modified2020-06-02
    plugin id73205
    published2014-03-26
    reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/73205
    titleCitrix NetScaler Application Delivery Controller Multiple Vulnerabilities
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2012-0876.NASL
    descriptionUpdated net-snmp packages that fix one security issue and multiple bugs are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser. An array index error, leading to an out-of-bounds buffer read flaw, was found in the way the net-snmp agent looked up entries in the extension table. A remote attacker with read privileges to a Management Information Base (MIB) subtree handled by the
    last seen2020-06-01
    modified2020-06-02
    plugin id59927
    published2012-07-11
    reporterThis script is Copyright (C) 2012-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/59927
    titleCentOS 6 : net-snmp (CESA-2012:0876)
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_5D85976A901111E1B5E0000C299B62E1.NASL
    descriptionThe Red Hat Security Response Team reports : An array index error, leading to out-of heap-based buffer read flaw was found in the way the net-snmp agent performed lookups in the extension table. When certain MIB subtrees were handled by the extend directive, a remote attacker (having read privileges to the subntree) could use this flaw to cause a denial of service condition via an SNMP GET request involving a non-existent extension table entry.
    last seen2020-06-01
    modified2020-06-02
    plugin id58889
    published2012-04-27
    reporterThis script is Copyright (C) 2012-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/58889
    titleFreeBSD : net-snmp -- Remote DoS (5d85976a-9011-11e1-b5e0-000c299b62e1)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201409-02.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201409-02 (Net-SNMP: Denial of Service) Multiple vulnerabilities have been discovered in Net-SNMP. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could create a Denial of Service condition. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id77471
    published2014-09-02
    reporterThis script is Copyright (C) 2014-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/77471
    titleGLSA-201409-02 : Net-SNMP: Denial of Service
  • NASL familyF5 Networks Local Security Checks
    NASL idF5_BIGIP_SOL15883.NASL
    descriptionArray index error in the handle_nsExtendOutput2Table function in agent/mibgroup/agent/extend.c in Net-SNMP 5.7.1 allows remote authenticated users to cause a denial of service (out-of-bounds read and snmpd crash) via an SNMP GET request for an entry not in the extension table. (CVE-2012-2141)
    last seen2020-06-01
    modified2020-06-02
    plugin id79605
    published2014-11-28
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/79605
    titleF5 Networks BIG-IP : Net-SNMP vulnerability (K15883)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2012-099.NASL
    descriptionA vulnerability has been discovered and corrected in net-snmp : An array index error, leading to out-of heap-based buffer read flaw was found in the way net-snmp agent performed entries lookup in the extension table. When certain MIB subtree was handled by the extend directive, a remote attacker having read privilege to the subtree could use this flaw to cause a denial of service (snmpd crash) via SNMP GET request involving a non-existent extension table entry (CVE-2012-2141). The updated packages have been patched to correct this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id59653
    published2012-06-22
    reporterThis script is Copyright (C) 2012-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/59653
    titleMandriva Linux Security Advisory : net-snmp (MDVSA-2012:099)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20130108_NET_SNMP_ON_SL5_X.NASL
    descriptionAn out-of-bounds buffer read flaw was found in the net-snmp agent. A remote attacker with read privileges to a Management Information Base (MIB) subtree handled by the
    last seen2020-03-18
    modified2013-01-17
    plugin id63600
    published2013-01-17
    reporterThis script is Copyright (C) 2013-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/63600
    titleScientific Linux Security Update : net-snmp on SL5.x i386/x86_64 (20130108)
  • NASL familyAmazon Linux Local Security Checks
    NASL idALA_ALAS-2012-97.NASL
    descriptionAn array index error, leading to an out-of-bounds buffer read flaw, was found in the way the net-snmp agent looked up entries in the extension table. A remote attacker with read privileges to a Management Information Base (MIB) subtree handled by the
    last seen2020-06-01
    modified2020-06-02
    plugin id69704
    published2013-09-04
    reporterThis script is Copyright (C) 2013-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/69704
    titleAmazon Linux AMI : net-snmp (ALAS-2012-97)

Redhat

advisories
  • bugzilla
    id822480
    titlemove /var/lib/net-snmp from net-snmp to net-snmp-libs
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 6 is installed
        ovaloval:com.redhat.rhba:tst:20111656003
      • OR
        • AND
          • commentnet-snmp-perl is earlier than 1:5.5-41.el6
            ovaloval:com.redhat.rhsa:tst:20120876001
          • commentnet-snmp-perl is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20131150012
        • AND
          • commentnet-snmp-devel is earlier than 1:5.5-41.el6
            ovaloval:com.redhat.rhsa:tst:20120876003
          • commentnet-snmp-devel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20131150008
        • AND
          • commentnet-snmp is earlier than 1:5.5-41.el6
            ovaloval:com.redhat.rhsa:tst:20120876005
          • commentnet-snmp is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20131150010
        • AND
          • commentnet-snmp-libs is earlier than 1:5.5-41.el6
            ovaloval:com.redhat.rhsa:tst:20120876007
          • commentnet-snmp-libs is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20131150004
        • AND
          • commentnet-snmp-utils is earlier than 1:5.5-41.el6
            ovaloval:com.redhat.rhsa:tst:20120876009
          • commentnet-snmp-utils is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20131150002
        • AND
          • commentnet-snmp-python is earlier than 1:5.5-41.el6
            ovaloval:com.redhat.rhsa:tst:20120876011
          • commentnet-snmp-python is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20131150006
    rhsa
    idRHSA-2012:0876
    released2012-06-19
    severityModerate
    titleRHSA-2012:0876: net-snmp security and bug fix update (Moderate)
  • bugzilla
    id840861
    title cannot bind to the specified port
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 5 is installed
        ovaloval:com.redhat.rhba:tst:20070331005
      • OR
        • AND
          • commentnet-snmp-utils is earlier than 1:5.3.2.2-20.el5
            ovaloval:com.redhat.rhsa:tst:20130124001
          • commentnet-snmp-utils is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20071045021
        • AND
          • commentnet-snmp-perl is earlier than 1:5.3.2.2-20.el5
            ovaloval:com.redhat.rhsa:tst:20130124003
          • commentnet-snmp-perl is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20071045019
        • AND
          • commentnet-snmp-devel is earlier than 1:5.3.2.2-20.el5
            ovaloval:com.redhat.rhsa:tst:20130124005
          • commentnet-snmp-devel is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20071045013
        • AND
          • commentnet-snmp-libs is earlier than 1:5.3.2.2-20.el5
            ovaloval:com.redhat.rhsa:tst:20130124007
          • commentnet-snmp-libs is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20071045015
        • AND
          • commentnet-snmp is earlier than 1:5.3.2.2-20.el5
            ovaloval:com.redhat.rhsa:tst:20130124009
          • commentnet-snmp is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20071045017
    rhsa
    idRHSA-2013:0124
    released2013-01-08
    severityModerate
    titleRHSA-2013:0124: net-snmp security and bug fix update (Moderate)
rpms
  • net-snmp-1:5.5-41.el6
  • net-snmp-debuginfo-1:5.5-41.el6
  • net-snmp-devel-1:5.5-41.el6
  • net-snmp-libs-1:5.5-41.el6
  • net-snmp-perl-1:5.5-41.el6
  • net-snmp-python-1:5.5-41.el6
  • net-snmp-utils-1:5.5-41.el6
  • net-snmp-1:5.3.2.2-20.el5
  • net-snmp-debuginfo-1:5.3.2.2-20.el5
  • net-snmp-devel-1:5.3.2.2-20.el5
  • net-snmp-libs-1:5.3.2.2-20.el5
  • net-snmp-perl-1:5.3.2.2-20.el5
  • net-snmp-utils-1:5.3.2.2-20.el5