On Mon, Jan 29, 2018 at 10:53:31AM -0300, Pedro Barbosa wrote:
> Hi,
> 
> Does anyone know which CVE regards to this issue?
> 
> https://github.com/rapid7/metasploit-framework/pull/9396
> 
> /This exploit module exploits the SNMP write access configuration ability of
> SNMP-EXTEND-MIB to configure MIB extensions and lead to remote code
> execution.

Well, I do not know of any CVE number but I will happily admit that it
looks like a catastrohy waiting to happen.

I propose that

1. The ability to add commands is removed from the extend module (all
   entries are to be read-only)
2. agent/extend is removed from ucd_snmp.h

Do you think this is a good idea going forward?

/MF

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Net-snmp-coders mailing list
Net-snmp-coders@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/net-snmp-coders

Reply via email to