vulnerability
Red Hat: CVE-2022-44792: NULL Pointer Exception when handling ipDefaultTTL (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:M/Au:N/C:N/I:N/A:C) | 2022-11-07 | 2023-05-15 | 2025-01-28 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:C)
Published
2022-11-07
Added
2023-05-15
Modified
2025-01-28
Description
handle_ipDefaultTTL in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.8 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker (who has write access) to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.
Solution(s)
redhat-upgrade-net-snmpredhat-upgrade-net-snmp-agent-libsredhat-upgrade-net-snmp-agent-libs-debuginforedhat-upgrade-net-snmp-debuginforedhat-upgrade-net-snmp-debugsourceredhat-upgrade-net-snmp-develredhat-upgrade-net-snmp-libsredhat-upgrade-net-snmp-libs-debuginforedhat-upgrade-net-snmp-perlredhat-upgrade-net-snmp-perl-debuginforedhat-upgrade-net-snmp-utilsredhat-upgrade-net-snmp-utils-debuginforedhat-upgrade-python3-net-snmpredhat-upgrade-python3-net-snmp-debuginfo

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.