Date:         Fri, 27 Mar 2009 13:48:15 -0500
Reply-To:     Troy Dawson 
Sender:       Security Errata for Scientific Linux
              
From:         Troy Dawson 
Subject:      Security ERRATA Moderate: net-snmp on SL3.x i386/x86_64
Comments: To: "scientific-linux-errata@fnal.gov"
          

Synopsis:	Moderate: net-snmp security update
Issue date:	2009-03-26
CVE Names:	CVE-2008-6123

It was discovered that the snmpd daemon did not use TCP wrappers 
correctly, causing network hosts access restrictions defined in 
"/etc/hosts.allow" and "/etc/hosts.deny" to not be honored. A remote 
attacker could use this flaw to bypass intended access restrictions. 
(CVE-2008-6123)

This issue only affected configurations where hosts.allow and hosts.deny
were used to limit access to the SNMP server. To obtain information from
the server, the attacker would have to successfully authenticate, 
usually by providing a correct community string.

After installing the update, the snmpd and snmptrapd daemons will be 
restarted automatically.

SL 3.0.x

      SRPMS:
net-snmp-5.0.9-2.30E.27.src.rpm
      i386:
net-snmp-5.0.9-2.30E.27.i386.rpm
net-snmp-devel-5.0.9-2.30E.27.i386.rpm
net-snmp-libs-5.0.9-2.30E.27.i386.rpm
net-snmp-perl-5.0.9-2.30E.27.i386.rpm
net-snmp-utils-5.0.9-2.30E.27.i386.rpm
      x86_64:
net-snmp-5.0.9-2.30E.27.x86_64.rpm
net-snmp-devel-5.0.9-2.30E.27.x86_64.rpm
net-snmp-libs-5.0.9-2.30E.27.i386.rpm
net-snmp-libs-5.0.9-2.30E.27.x86_64.rpm
net-snmp-perl-5.0.9-2.30E.27.x86_64.rpm
net-snmp-utils-5.0.9-2.30E.27.x86_64.rpm

-Connie Sieh
-Troy Dawson

SciLinux: CVE-2008-6123 Moderate: net-snmp SL3.x i386/x86_64

Moderate: net-snmp security update

Summary

Date:         Fri, 27 Mar 2009 13:48:15 -0500Reply-To:     Troy Dawson Sender:       Security Errata for Scientific Linux              From:         Troy Dawson Subject:      Security ERRATA Moderate: net-snmp on SL3.x i386/x86_64Comments: To: "scientific-linux-errata@fnal.gov"          Synopsis:	Moderate: net-snmp security updateIssue date:	2009-03-26CVE Names:	CVE-2008-6123It was discovered that the snmpd daemon did not use TCP wrappers correctly, causing network hosts access restrictions defined in "/etc/hosts.allow" and "/etc/hosts.deny" to not be honored. A remote attacker could use this flaw to bypass intended access restrictions. (CVE-2008-6123)This issue only affected configurations where hosts.allow and hosts.denywere used to limit access to the SNMP server. To obtain information fromthe server, the attacker would have to successfully authenticate, usually by providing a correct community string.After installing the update, the snmpd and snmptrapd daemons will be restarted automatically.SL 3.0.x      SRPMS:net-snmp-5.0.9-2.30E.27.src.rpm      i386:net-snmp-5.0.9-2.30E.27.i386.rpmnet-snmp-devel-5.0.9-2.30E.27.i386.rpmnet-snmp-libs-5.0.9-2.30E.27.i386.rpmnet-snmp-perl-5.0.9-2.30E.27.i386.rpmnet-snmp-utils-5.0.9-2.30E.27.i386.rpm      x86_64:net-snmp-5.0.9-2.30E.27.x86_64.rpmnet-snmp-devel-5.0.9-2.30E.27.x86_64.rpmnet-snmp-libs-5.0.9-2.30E.27.i386.rpmnet-snmp-libs-5.0.9-2.30E.27.x86_64.rpmnet-snmp-perl-5.0.9-2.30E.27.x86_64.rpmnet-snmp-utils-5.0.9-2.30E.27.x86_64.rpm-Connie Sieh-Troy Dawson



Security Fixes

Severity