| Vulnerability Name: | CVE-2019-20892 (CCN-185745) | ||||||||||||||||||
| Assigned: | 2019-02-14 | ||||||||||||||||||
| Published: | 2019-02-14 | ||||||||||||||||||
| Updated: | 2022-09-02 | ||||||||||||||||||
| Summary: | net-snmp before 5.8.1.pre1 has a double free in usm_free_usmStateReference in snmplib/snmpusm.c via an SNMPv3 GetBulk request. Note: this affects net-snmp packages shipped to end users by multiple Linux distributions, but might not affect an upstream release. | ||||||||||||||||||
| CVSS v3 Severity: | 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) 5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
5.7 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||
| CVSS v2 Severity: | 4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P)
| ||||||||||||||||||
| Vulnerability Type: | CWE-415 CWE-416 | ||||||||||||||||||
| Vulnerability Consequences: | Denial of Service | ||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2019-20892 Source: MLIST Type: Exploit, Mailing List, Third Party Advisory [oss-security] 20200625 [cve-request@...re.org: Re: [scr916814] net-snmp - Perhaps only unreleased development versions; fix appears to be in v5.8.1.pre1] Source: MISC Type: Exploit, Issue Tracking, Third Party Advisory https://bugs.launchpad.net/ubuntu/+source/net-snmp/+bug/1877027 Source: MISC Type: Exploit, Issue Tracking, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=1663027 Source: XF Type: UNKNOWN netsnmp-cve201920892-dos(185745) Source: CCN Type: net-snmp GIT Repository libsnmp, USM: Introduce a reference count in struct usmStateReference Source: MISC Type: Patch, Third Party Advisory https://github.com/net-snmp/net-snmp/commit/5f881d3bf24599b90d67a45cae7a3eb099cd71c9 Source: GENTOO Type: Third Party Advisory GLSA-202008-12 Source: CCN Type: SourceForge net-snmp Projec Web site #2923 5.8.0: linux seeing snmpd snmpusb.c:usm_rgenerate_out_msg() core dump with double free error Source: MISC Type: Exploit, Third Party Advisory https://sourceforge.net/p/net-snmp/bugs/2923/ Source: UBUNTU Type: Third Party Advisory USN-4410-1 Source: MISC Type: Patch, Third Party Advisory https://www.oracle.com/security-alerts/cpujan2021.html Source: CCN Type: WhiteSource Vulnerability Database CVE-2019-20892 | ||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration RedHat 1: Configuration RedHat 2: Configuration RedHat 3: Configuration RedHat 4: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||
| Oval Definitions | |||||||||||||||||||
| |||||||||||||||||||
| BACK | |||||||||||||||||||