SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Embedded Server/Appliance)  >   F5 Enterprise Manager Vendors:   F5 Networks
(F5 Networks Issues Advisory for F5 Enterprise Manager) Net-snmp Incomplete Parsing in snmp_pdu_parse() Lets Remote Users Crash snmpd or Execute Arbitrary Code
SecurityTracker Alert ID:  1033765
SecurityTracker URL:  http://securitytracker.com/id/1033765
CVE Reference:   CVE-2015-5621   (Links to External Site)
Date:  Oct 8 2015
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Net-snmp. A remote user can cause the target service to crash. A remote user can execute arbitrary code on the target system. F5 Enterprise Manager is affected.

A remote user can send specially crafted data to trigger a parsing error in snmp_pdu_parse() and cause the target snmpd process to crash or execute arbitrary code on the target system. The code will run with the privileges of the target snmp service.

Qinghao Tang of QIHU 360, China, reported this vulnerability.

Impact:   A remote user can cause the target service to crash.

A remote user can execute arbitrary code on the target system.

Solution:   F5 Networks has issued an advisory for CVE-2015-5621 for F5 Enterprise Manager. No solution was available at the time of this entry.

F5 has assigned ID 548812 to this vulnerability.

The F5 Networks advisory is available at:

https://support.f5.com/kb/en-us/solutions/public/17000/300/sol17378.html

Vendor URL:  support.f5.com/kb/en-us/solutions/public/17000/300/sol17378.html (Links to External Site)
Cause:   Access control error

Message History:   This archive entry is a follow-up to the message listed below.
Aug 18 2015 Net-snmp Incomplete Parsing in snmp_pdu_parse() Lets Remote Users Crash snmpd or Execute Arbitrary Code



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC