Ubuntu Security Notice USN-4471-1 ≈ Packet Storm – Digitalmunition

Exploit/Advisories no-image-featured-image.png

Published on August 26th, 2020 📆 | 3433 Views ⚑


Ubuntu Security Notice USN-4471-1 ≈ Packet Storm

Ubuntu Security Notice USN-4471-1
August 24, 2020

net-snmp vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 20.04 LTS
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 ESM
– Ubuntu 12.04 ESM


Several security issues were fixed in Net-SNMP.

Software Description:
– net-snmp: SNMP (Simple Network Management Protocol) server and applications


Tobias Neitzel discovered that Net-SNMP incorrectly handled certain symlinks.
An attacker could possibly use this issue to access sensitive information.

It was discovered that Net-SNMP incorrectly handled certain inputs.
An attacker could possibly use this issue to execute arbitrary code.
This issue only affected Ubuntu 14.04 ESM, Ubuntu 16.04 LTS, Ubuntu
18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2020-15862)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
libsnmp-base 5.8+dfsg-2ubuntu2.3
libsnmp-perl 5.8+dfsg-2ubuntu2.3
libsnmp35 5.8+dfsg-2ubuntu2.3
snmpd 5.8+dfsg-2ubuntu2.3

Ubuntu 18.04 LTS:
libsnmp-base 5.7.3+dfsg-1.8ubuntu3.5
libsnmp-perl 5.7.3+dfsg-1.8ubuntu3.5
libsnmp30 5.7.3+dfsg-1.8ubuntu3.5
snmpd 5.7.3+dfsg-1.8ubuntu3.5

Ubuntu 16.04 LTS:
libsnmp-base 5.7.3+dfsg-1ubuntu4.5
libsnmp-perl 5.7.3+dfsg-1ubuntu4.5
libsnmp30 5.7.3+dfsg-1ubuntu4.5
snmpd 5.7.3+dfsg-1ubuntu4.5

Ubuntu 14.04 ESM:
libsnmp-base 5.7.2~dfsg-8.1ubuntu3.3+esm1
libsnmp-perl 5.7.2~dfsg-8.1ubuntu3.3+esm1
libsnmp30 5.7.2~dfsg-8.1ubuntu3.3+esm1
snmpd 5.7.2~dfsg-8.1ubuntu3.3+esm1

Ubuntu 12.04 ESM:
libsnmp-base 5.4.3~dfsg-2.4ubuntu1.5
libsnmp-perl 5.4.3~dfsg-2.4ubuntu1.5
libsnmp15 5.4.3~dfsg-2.4ubuntu1.5
snmpd 5.4.3~dfsg-2.4ubuntu1.5

After a standard system update you need to restart snmpd to make
all the necessary changes.

CVE-2020-15861, CVE-2020-15862

Package Information:

Source link

Tagged with:

Leave a Reply

Your email address will not be published. Required fields are marked *