On affected platforms running Arista EOS with SNMP configured, a specially crafted packet can cause a memory leak in the snmpd process. This may result in the snmpd processing being terminated (causing SNMP requests to time out until snmpd is automatically restarted) and potential memory resource exhaustion for other processes on the switch. The vulnerability does not have any confidentiality or integrity impacts to the system.
Attack Vector Network
Attack Complexity Low
Privileges Required None
Scope Unchanged
Confidentiality Impact None
Integrity Impact None
Availability Impact High
User Interaction None
No CVSS v3.0
No CVSS v2
Vendors | Products |
---|---|
Arista |
|
Configuration 1 [-]
AND |
|
References
Link | Resource |
---|---|
https://www.arista.com/en/support/advisories-notices/security-advisory/17239-security-advisory-0084 | Exploit Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Arista
Published: 2023-04-12T00:00:00
Updated: 2023-04-12T00:00:00
Reserved: 2023-01-24T00:00:00
Link: CVE-2023-24511
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-04-12T21:15:16.707
Modified: 2023-04-21T14:27:47.903
Link: CVE-2023-24511
JSON object: View
Redhat Information
No data.
CWE