Name | CVE-2020-15862 |
Description | Net-SNMP through 5.8 has Improper Privilege Management because SNMP WRITE access to the EXTEND MIB provides the ability to run arbitrary commands as root. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2299-1, DSA-4746-1, ELA-252-1 |
Debian Bugs | 965166 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
net-snmp (PTS) | jessie, jessie (lts) | 5.7.2.1+dfsg-1+deb8u6 | fixed |
| stretch (security) | 5.7.3+dfsg-1.7+deb9u3 | fixed |
| stretch (lts), stretch | 5.7.3+dfsg-1.7+deb9u5 | fixed |
| buster (security), buster, buster (lts) | 5.7.3+dfsg-5+deb10u4 | fixed |
| bullseye (security), bullseye | 5.9+dfsg-4+deb11u1 | fixed |
| bookworm | 5.9.3+dfsg-2 | fixed |
| sid, trixie | 5.9.4+dfsg-1.1 | fixed |
The information below is based on the following data on fixed versions.
Notes
The commit https://github.com/net-snmp/net-snmp/commit/c2b96ee744392243782094432f657ded4e985a07
disables NET-SNMP-EXTEND-MIB support by default. But it is still
possible to enable the MIB via --with-mib-modules configure option.
Upstream reverted the change and the solution is to make NET-SNMP-EXTEND-MIB
read-only, cf. https://bugs.debian.org/966544
Disabling was reverted with: https://github.com/net-snmp/net-snmp/commit/4097a311e952d3b5c12610102bb4cc2fe72b56e5
Makes extended mib read-only:
https://github.com/net-snmp/net-snmp/commit/77f6c60f57dba0aaea5d8ef1dd94bcd0c8e6d205