Net-SNMP 5.0.x before 5.0.10.2, 5.2.x before 5.2.1.2, and 5.1.3, when net-snmp is using stream sockets such as TCP, allows remote attackers to cause a denial of service (daemon hang and CPU consumption) via a TCP packet of length 1, which triggers an infinite loop.
2005-07-11T04:00:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 5.0 (MEDIUM)
AV:N/AC:L/Au:N/C:N/I:N/A:P
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | net-snmp | net-snmp | 5.0 | Yes |
Application | net-snmp | net-snmp | 5.0.1 | Yes |
Application | net-snmp | net-snmp | 5.0.2 | Yes |
Application | net-snmp | net-snmp | 5.0.3 | Yes |
Application | net-snmp | net-snmp | 5.0.4_pre2 | Yes |
Application | net-snmp | net-snmp | 5.0.5 | Yes |
Application | net-snmp | net-snmp | 5.0.6 | Yes |
Application | net-snmp | net-snmp | 5.0.7 | Yes |
Application | net-snmp | net-snmp | 5.0.8 | Yes |
Application | net-snmp | net-snmp | 5.0.9 | Yes |
Application | net-snmp | net-snmp | 5.0.10 | Yes |
Application | net-snmp | net-snmp | 5.1.3 | Yes |
Application | net-snmp | net-snmp | 5.2 | Yes |
Application | net-snmp | net-snmp | 5.2.1 | Yes |