net-snmp: Authorization bypass A remote attacker can bypass the tcp-wrappers client authorization in net-snmp. net-snmp January 13, 2010 January 13, 2010: 01 250429 remote 5.4.2.1-r1 5.4.2.1-r1

net-snmp bundles software for generating and retrieving SNMP data.

The netsnmp_udp_fmtaddr() function (snmplib/snmpUDPDomain.c), when using TCP wrappers for client authorization, does not properly parse hosts.allow rules.

A remote, unauthenticated attacker could bypass the ACL filtering, possibly resulting in the execution of arbitrary SNMP queries.

If possible, protect net-snmp with custom iptables rules:

iptables -s [client] -d [host] -p udp --dport 161 -j ACCEPT iptables -s 0.0.0.0/0 -d [host] -p udp --dport 161 -j DROP

All net-snmp users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=net-analyzer/net-snmp-5.4.2.1-r1"
CVE-2008-6123 craig craig craig