The snmp_trap_decode function in the SNMP NAT helper for Linux kernel before 2.6.16.18 allows remote attackers to cause a denial of service (crash) via unspecified remote attack vectors that cause failures in snmp_trap_decode that trigger (1) frees of random memory or (2) frees of previously-freed memory (double-free) by snmp_trap_decode as well as its calling function, as demonstrated via certain test cases of the PROTOS SNMP test suite.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.18 cve-icon cve-icon
http://secunia.com/advisories/20182 cve-icon cve-icon
http://secunia.com/advisories/20225 cve-icon cve-icon
http://secunia.com/advisories/20716 cve-icon cve-icon
http://secunia.com/advisories/21035 cve-icon cve-icon
http://secunia.com/advisories/21136 cve-icon cve-icon
http://secunia.com/advisories/21179 cve-icon cve-icon
http://secunia.com/advisories/21498 cve-icon cve-icon
http://secunia.com/advisories/21605 cve-icon cve-icon
http://secunia.com/advisories/21983 cve-icon cve-icon
http://secunia.com/advisories/22082 cve-icon cve-icon
http://secunia.com/advisories/22093 cve-icon cve-icon
http://secunia.com/advisories/22174 cve-icon cve-icon
http://secunia.com/advisories/22822 cve-icon cve-icon
http://securitytracker.com/id?1016153 cve-icon cve-icon
http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm cve-icon cve-icon
http://support.avaya.com/elmodocs2/security/ASA-2006-203.htm cve-icon cve-icon
http://www.debian.org/security/2006/dsa-1183 cve-icon cve-icon
http://www.debian.org/security/2006/dsa-1184 cve-icon cve-icon
http://www.kb.cert.org/vuls/id/681569 cve-icon cve-icon
http://www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.16.y.git%3Ba=commit%3Bh=1db6b5a66e93ff125ab871d6b3f7363412cc87e8 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2006:087 cve-icon cve-icon
http://www.novell.com/linux/security/advisories/2006_42_kernel.html cve-icon cve-icon
http://www.novell.com/linux/security/advisories/2006_47_kernel.html cve-icon cve-icon
http://www.novell.com/linux/security/advisories/2006_64_kernel.html cve-icon cve-icon
http://www.osvdb.org/25750 cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2006-0437.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2006-0580.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2006-0617.html cve-icon cve-icon
http://www.securityfocus.com/bid/18081 cve-icon cve-icon
http://www.ubuntu.com/usn/usn-302-1 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/1916 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/26594 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2006-2444 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11318 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2006-2444 cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-07T17:51:04.762Z

Reserved: 2006-05-18T00:00:00

Link: CVE-2006-2444

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2006-05-25T10:02:00.000

Modified: 2025-04-03T01:03:51.193

Link: CVE-2006-2444

cve-icon Redhat

Severity : Moderate

Publid Date: 2006-05-20T00:00:00Z

Links: CVE-2006-2444 - Bugzilla

cve-icon OpenCVE Enrichment

No data.