Buffer overflow in snmpd in ucd-snmp 4.2.6 and earlier, when installed setuid root, allows local users to execute arbitrary code via a long -p command line argument. NOTE: it is not clear whether there are any standard configurations in which snmpd is installed setuid or setgid. If not, then this issue should not be included in CVE.
References
Configurations
History
20 Nov 2024, 23:52
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.packetstormsecurity.org/0405-advisories/snmpdadv.txt - Exploit, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/10396 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/16245 - |
Information
Published : 2004-12-31 05:00
Updated : 2024-11-20 23:52
NVD link : CVE-2004-2300
Mitre link : CVE-2004-2300
CVE.ORG link : CVE-2004-2300
JSON object : View
Products Affected
ucd-snmp
- ucd-snmp
CWE