A stack buffer overflow vulnerability exists in the way MiniSNMPD version 1.4 handles multiple connections. A specially timed sequence of SNMP connections can trigger a stack overflow, resulting in a denial of service. To trigger this vulnerability, an attacker needs to simply initiate multiple connections to the server.
References
| Link | Resource |
|---|---|
| https://talosintelligence.com/vulnerability_reports/TALOS-2019-0977 | Exploit Third Party Advisory |
| https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-0977 | Exploit Third Party Advisory |
| https://talosintelligence.com/vulnerability_reports/TALOS-2019-0977 | Exploit Third Party Advisory |
| https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-0977 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:35
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://talosintelligence.com/vulnerability_reports/TALOS-2019-0977 - Exploit, Third Party Advisory | |
| References | () https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-0977 - Exploit, Third Party Advisory |
Information
Published : 2020-02-04 20:15
Updated : 2024-11-21 05:35
NVD link : CVE-2020-6060
Mitre link : CVE-2020-6060
CVE.ORG link : CVE-2020-6060
JSON object : View
Products Affected
minisnmpd_project
- minisnmpd
CWE
CWE-787
Out-of-bounds Write
