Buffer overflow in snmpd in ucd-snmp 4.2.6 and earlier, when installed setuid root, allows local users to execute arbitrary code via a long -p command line argument. NOTE: it is not clear whether there are any standard configurations in which snmpd is installed setuid or setgid. If not, then this issue should not be included in CVE.
References
Link | Resource |
---|---|
http://www.packetstormsecurity.org/0405-advisories/snmpdadv.txt | Exploit Vendor Advisory |
http://www.securityfocus.com/bid/10396 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16245 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2005-08-05T04:00:00
Updated: 2017-07-10T14:57:01
Reserved: 2005-08-05T00:00:00
Link: CVE-2004-2300
JSON object: View
NVD Information
Status : Modified
Published: 2004-12-31T05:00:00.000
Modified: 2017-07-11T01:31:46.593
Link: CVE-2004-2300
JSON object: View
Redhat Information
No data.
CWE