Show plain JSON{"containers": {"cna": {"affected": [{"product": "n/a", "vendor": "n/a", "versions": [{"status": "affected", "version": "n/a"}]}], "datePublic": "2008-12-09T00:00:00", "descriptions": [{"lang": "en", "value": "The netsnmp_udp_fmtaddr function (snmplib/snmpUDPDomain.c) in net-snmp 5.0.9 through 5.4.2.1, when using TCP wrappers for client authorization, does not properly parse hosts.allow rules, which allows remote attackers to bypass intended access restrictions and execute SNMP queries, related to \"source/destination IP address confusion.\""}], "problemTypes": [{"descriptions": [{"description": "n/a", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre"}, "references": [{"name": "[oss-security] 20090212 CVE Request -- net-snmp (sensitive host information disclosure)", "tags": ["mailing-list", "x_refsource_MLIST"], "url": "http://www.openwall.com/lists/oss-security/2009/02/12/2"}, {"name": "[oss-security] 20090212 Re: CVE Request -- net-snmp (sensitive host information disclosure)", "tags": ["mailing-list", "x_refsource_MLIST"], "url": "http://www.openwall.com/lists/oss-security/2009/02/12/7"}, {"tags": ["x_refsource_CONFIRM"], "url": "http://bugs.gentoo.org/show_bug.cgi?id=250429"}, {"tags": ["x_refsource_CONFIRM"], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=485211"}, {"name": "[oss-security] Re: 20090212 CVE Request -- net-snmp (sensitive host information disclosure)", "tags": ["mailing-list", "x_refsource_MLIST"], "url": "http://www.openwall.com/lists/oss-security/2009/02/12/4"}, {"name": "SUSE-SR:2009:011", "tags": ["vendor-advisory", "x_refsource_SUSE"], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html"}, {"name": "SUSE-SR:2010:003", "tags": ["vendor-advisory", "x_refsource_SUSE"], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00003.html"}, {"name": "RHSA-2009:0295", "tags": ["vendor-advisory", "x_refsource_REDHAT"], "url": "http://www.redhat.com/support/errata/RHSA-2009-0295.html"}, {"name": "35685", "tags": ["third-party-advisory", "x_refsource_SECUNIA"], "url": "http://secunia.com/advisories/35685"}, {"name": "34499", "tags": ["third-party-advisory", "x_refsource_SECUNIA"], "url": "http://secunia.com/advisories/34499"}, {"name": "SUSE-SR:2009:012", "tags": ["vendor-advisory", "x_refsource_SUSE"], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html"}, {"name": "35416", "tags": ["third-party-advisory", "x_refsource_SECUNIA"], "url": "http://secunia.com/advisories/35416"}, {"tags": ["x_refsource_CONFIRM"], "url": "http://net-snmp.svn.sourceforge.net/viewvc/net-snmp?view=rev&revision=17367"}, {"name": "oval:org.mitre.oval:def:10289", "tags": ["vdb-entry", "signature", "x_refsource_OVAL"], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10289"}, {"name": "1021921", "tags": ["vdb-entry", "x_refsource_SECTRACK"], "url": "http://www.securitytracker.com/id?1021921"}, {"tags": ["x_refsource_MISC"], "url": "http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/trunk/net-snmp/snmplib/snmpUDPDomain.c?r1=17325&r2=17367&pathrev=17367"}], "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-6123", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "n/a", "version": {"version_data": [{"version_value": "n/a"}]}}]}, "vendor_name": "n/a"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "The netsnmp_udp_fmtaddr function (snmplib/snmpUDPDomain.c) in net-snmp 5.0.9 through 5.4.2.1, when using TCP wrappers for client authorization, does not properly parse hosts.allow rules, which allows remote attackers to bypass intended access restrictions and execute SNMP queries, related to \"source/destination IP address confusion.\""}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "n/a"}]}]}, "references": {"reference_data": [{"name": "[oss-security] 20090212 CVE Request -- net-snmp (sensitive host information disclosure)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2009/02/12/2"}, {"name": "[oss-security] 20090212 Re: CVE Request -- net-snmp (sensitive host information disclosure)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2009/02/12/7"}, {"name": "http://bugs.gentoo.org/show_bug.cgi?id=250429", "refsource": "CONFIRM", "url": "http://bugs.gentoo.org/show_bug.cgi?id=250429"}, {"name": "https://bugzilla.redhat.com/show_bug.cgi?id=485211", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=485211"}, {"name": "[oss-security] Re: 20090212 CVE Request -- net-snmp (sensitive host information disclosure)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2009/02/12/4"}, {"name": "SUSE-SR:2009:011", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html"}, {"name": "SUSE-SR:2010:003", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00003.html"}, {"name": "RHSA-2009:0295", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-0295.html"}, {"name": "35685", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35685"}, {"name": "34499", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34499"}, {"name": "SUSE-SR:2009:012", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html"}, {"name": "35416", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35416"}, {"name": "http://net-snmp.svn.sourceforge.net/viewvc/net-snmp?view=rev&revision=17367", "refsource": "CONFIRM", "url": "http://net-snmp.svn.sourceforge.net/viewvc/net-snmp?view=rev&revision=17367"}, {"name": "oval:org.mitre.oval:def:10289", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10289"}, {"name": "1021921", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1021921"}, {"name": "http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/trunk/net-snmp/snmplib/snmpUDPDomain.c?r1=17325&r2=17367&pathrev=17367", "refsource": "MISC", "url": "http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/trunk/net-snmp/snmplib/snmpUDPDomain.c?r1=17325&r2=17367&pathrev=17367"}]}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-07T11:20:25.209Z"}, "title": "CVE Program Container", "references": [{"name": "[oss-security] 20090212 CVE Request -- net-snmp (sensitive host information disclosure)", "tags": ["mailing-list", "x_refsource_MLIST", "x_transferred"], "url": "http://www.openwall.com/lists/oss-security/2009/02/12/2"}, {"name": "[oss-security] 20090212 Re: CVE Request -- net-snmp (sensitive host information disclosure)", "tags": ["mailing-list", "x_refsource_MLIST", "x_transferred"], "url": "http://www.openwall.com/lists/oss-security/2009/02/12/7"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "http://bugs.gentoo.org/show_bug.cgi?id=250429"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=485211"}, {"name": "[oss-security] Re: 20090212 CVE Request -- net-snmp (sensitive host information disclosure)", "tags": ["mailing-list", "x_refsource_MLIST", "x_transferred"], "url": "http://www.openwall.com/lists/oss-security/2009/02/12/4"}, {"name": "SUSE-SR:2009:011", "tags": ["vendor-advisory", "x_refsource_SUSE", "x_transferred"], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html"}, {"name": "SUSE-SR:2010:003", "tags": ["vendor-advisory", "x_refsource_SUSE", "x_transferred"], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00003.html"}, {"name": "RHSA-2009:0295", "tags": ["vendor-advisory", "x_refsource_REDHAT", "x_transferred"], "url": "http://www.redhat.com/support/errata/RHSA-2009-0295.html"}, {"name": "35685", "tags": ["third-party-advisory", "x_refsource_SECUNIA", "x_transferred"], "url": "http://secunia.com/advisories/35685"}, {"name": "34499", "tags": ["third-party-advisory", "x_refsource_SECUNIA", "x_transferred"], "url": "http://secunia.com/advisories/34499"}, {"name": "SUSE-SR:2009:012", "tags": ["vendor-advisory", "x_refsource_SUSE", "x_transferred"], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html"}, {"name": "35416", "tags": ["third-party-advisory", "x_refsource_SECUNIA", "x_transferred"], "url": "http://secunia.com/advisories/35416"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "http://net-snmp.svn.sourceforge.net/viewvc/net-snmp?view=rev&revision=17367"}, {"name": "oval:org.mitre.oval:def:10289", "tags": ["vdb-entry", "signature", "x_refsource_OVAL", "x_transferred"], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10289"}, {"name": "1021921", "tags": ["vdb-entry", "x_refsource_SECTRACK", "x_transferred"], "url": "http://www.securitytracker.com/id?1021921"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "http://net-snmp.svn.sourceforge.net/viewvc/net-snmp/trunk/net-snmp/snmplib/snmpUDPDomain.c?r1=17325&r2=17367&pathrev=17367"}]}]}, "cveMetadata": {"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-6123", "datePublished": "2009-02-12T16:00:00", "dateReserved": "2009-02-12T00:00:00", "dateUpdated": "2024-08-07T11:20:25.209Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}