Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Debian LTS: Security Advisory for net-snmp (DLA-2299-1)

Information

Severity

Severity

Medium

Family

Family

Debian Local Security Checks

CVSSv2 Base

CVSSv2 Base

5.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:N/A:N

Solution Type

Solution Type

Vendor Patch

Created

Created

3 years ago

Modified

Modified

3 years ago

Summary

The remote host is missing an update for the 'net-snmp' package(s) announced via the DLA-2299-1 advisory.

Insight

Insight

A privilege escalation vulnerability vulnerability was discovered in Net-SNMP, a set of tools for collecting and organising information about devices on computer networks. Upstream notes that: * It is still possible to enable this MIB via the --with-mib-modules configure option. * Another MIB that provides similar functionality, namely ucd-snmp/extensible, is disabled by default. * The security risk of ucd-snmp/pass and ucd-snmp/pass_persist is lower since these modules only introduce a security risk if the invoked scripts are exploitable.

Affected Software

Affected Software

'net-snmp' package(s) on Debian Linux.

Detection Method

Detection Method

Checks if a vulnerable package version is present on the target host.

Solution

Solution

For Debian 9 'Stretch', this issue has been fixed in net-snmp version 5.7.3+dfsg-1.7+deb9u2. We recommend that you upgrade your net-snmp packages.