CVE-2004-2300

NameCVE-2004-2300
DescriptionBuffer overflow in snmpd in ucd-snmp 4.2.6 and earlier, when installed setuid root, allows local users to execute arbitrary code via a long -p command line argument. NOTE: it is not clear whether there are any standard configurations in which snmpd is installed setuid or setgid. If not, then this issue should not be included in CVE.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
net-snmp (PTS)jessie, jessie (lts)5.7.2.1+dfsg-1+deb8u6fixed
stretch (security)5.7.3+dfsg-1.7+deb9u3fixed
stretch (lts), stretch5.7.3+dfsg-1.7+deb9u5fixed
buster5.7.3+dfsg-5+deb10u2fixed
buster (security)5.7.3+dfsg-5+deb10u4fixed
bullseye (security), bullseye5.9+dfsg-4+deb11u1fixed
bookworm5.9.3+dfsg-2fixed
sid, trixie5.9.4+dfsg-1.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
net-snmpsource(unstable)(not affected)

Notes

- net-snmp <not-affected> (snmpd is neither setuid nor setgid in Debian)

Search for package or bug name: Reporting problems