[USN-3792-1] Net-SNMP vulnerability


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)

protocol=”application/pgp-signature”;
boundary=”nW6ImVhzfxa88a3gWOnAZPptXaVi3Y7FQ”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–nW6ImVhzfxa88a3gWOnAZPptXaVi3Y7FQ

protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3792-1] Net-SNMP vulnerability

–XuY2aKS09L1rd3moCZ5I2fXk5QHyjEUdC

Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=
=

Ubuntu Security Notice USN-3792-1
October 15, 2018

net-snmp vulnerability
=
=

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Net-SNMP could be made to crash if it received specially crafted network
traffic.

Software Description:
– net-snmp: SNMP (Simple Network Management Protocol) server and applicat=
ions

Details:

It was discovered that Net-SNMP incorrectly handled certain certain craft=
ed
packets. A remote attacker could possibly use this issue to cause Net-SNM=
P
to crash, resulting in a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
libsnmp30 5.7.3+dfsg-1.8ubuntu3.1

Ubuntu 16.04 LTS:
libsnmp30 5.7.3+dfsg-1ubuntu4.2

Ubuntu 14.04 LTS:
libsnmp30 5.7.2~dfsg-8.1ubuntu3.3

In general, a standard system update will make all the necessary changes.=

References:
https://usn.ubuntu.com/usn/usn-3792-1
CVE-2018-18065

Package Information:
https://launchpad.net/ubuntu/+source/net-snmp/5.7.3+dfsg-1.8ubuntu3.1
https://launchpad.net/ubuntu/+source/net-snmp/5.7.3+dfsg-1ubuntu4.2
https://launchpad.net/ubuntu/+source/net-snmp/5.7.2~dfsg-8.1ubuntu3.3

–XuY2aKS09L1rd3moCZ5I2fXk5QHyjEUdC–

–nW6ImVhzfxa88a3gWOnAZPptXaVi3Y7FQ

Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–
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=403P
—–END PGP SIGNATURE—–

–nW6ImVhzfxa88a3gWOnAZPptXaVi3Y7FQ–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK