Date: Fri, 27 Mar 2009 13:48:15 -0500 Reply-To: Troy DawsonSender: Security Errata for Scientific Linux From: Troy Dawson Subject: Security ERRATA Moderate: net-snmp on SL3.x i386/x86_64 Comments: To: "scientific-linux-errata@fnal.gov" Synopsis: Moderate: net-snmp security update Issue date: 2009-03-26 CVE Names: CVE-2008-6123 It was discovered that the snmpd daemon did not use TCP wrappers correctly, causing network hosts access restrictions defined in "/etc/hosts.allow" and "/etc/hosts.deny" to not be honored. A remote attacker could use this flaw to bypass intended access restrictions. (CVE-2008-6123) This issue only affected configurations where hosts.allow and hosts.deny were used to limit access to the SNMP server. To obtain information from the server, the attacker would have to successfully authenticate, usually by providing a correct community string. After installing the update, the snmpd and snmptrapd daemons will be restarted automatically. SL 3.0.x SRPMS: net-snmp-5.0.9-2.30E.27.src.rpm i386: net-snmp-5.0.9-2.30E.27.i386.rpm net-snmp-devel-5.0.9-2.30E.27.i386.rpm net-snmp-libs-5.0.9-2.30E.27.i386.rpm net-snmp-perl-5.0.9-2.30E.27.i386.rpm net-snmp-utils-5.0.9-2.30E.27.i386.rpm x86_64: net-snmp-5.0.9-2.30E.27.x86_64.rpm net-snmp-devel-5.0.9-2.30E.27.x86_64.rpm net-snmp-libs-5.0.9-2.30E.27.i386.rpm net-snmp-libs-5.0.9-2.30E.27.x86_64.rpm net-snmp-perl-5.0.9-2.30E.27.x86_64.rpm net-snmp-utils-5.0.9-2.30E.27.x86_64.rpm -Connie Sieh -Troy Dawson