handle_ipDefaultTTL in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.8 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker (who has write access) to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://github.com/net-snmp/net-snmp/issues/474 | issue tracking exploit third party advisory |
https://gist.github.com/menglong2234/b7bc13ae1a144f47cc3c95a7ea062428 | third party advisory exploit |
https://lists.debian.org/debian-lts-announce/2023/01/msg00010.html | third party advisory mailing list |
https://security.netapp.com/advisory/ntap-20230223-0011/ | third party advisory |