NetSNMP vulnerabilty [CVE-2015-5621]
Advisory ID | CVE Number | Date discovered | Severity | Advisory revision |
---|---|---|---|---|
STORM-2015-011 | CVE-2015-5621 | 04/13/2015 | low | v2 |
Vulnerability details
A vulnerability has been disclosed in NetSNMP.
An attacker could cause a memory leak in snmp_pdu_parse() in order to cause a denial of service attack.
Impacted products
Products | Severity | Detail |
---|---|---|
Stormshield Network Security | low | The product embeds a vulnerable version of NetSNMP |
Fast360 | low | The product embeds a vulnerable version of NetSNMP |
Netasq | low | The product embeds a vulnerable version of NetSNMP |
Revisions
Version | Date | Description |
---|---|---|
v1 | 08/18/2015 | Initial release |
v2 | 04/15/2016 | Add Netasq and SNS products |

Stormshield Network Security |
CVSS v2 Overall Score: 2.2
|
Analysis |
Impacted version |
A memory leak present in snmp_pdu_parse() could cause a crash of NetSNMP in SNS appliances. |
|
Workaround solution |
Solution |
There is no workaround solution. |
The 1.5.0 and 2.4.0 updates will fix this vulnerability. |
Access vector | Access complexity | Authentication | Confidentiality impact | Integrity impact | Availability impact |
---|---|---|---|---|---|
Adjacent Network | High | None | None | None | Partial |
CVSS Base score: 1.8 | CVSS Vector: (AV:A/AC:H/Au:N/C:N/I:N/A:P) |
Exploitability | Remediation Level | Report Confidence |
---|---|---|
Unproven that exploit exists | Official fix | Confirmed |
CVSS Temporal score: 1.3 | CVSS Vector: (AV:A/AC:H/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C) |
Collateral Damage Potential | Target Distribution |
---|---|
Low | High [76-100%] |
CVSS Environmental score: 2.2 | CVSS Vector: (AV:A/AC:H/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C/CDP:L/TD:H/CR:ND/IR:ND/AR:ND) |

Fast360 |
CVSS v2 Overall Score: 2.2
|
Analysis |
Impacted version |
A memory leak present in snmp_pdu_parse() could cause a crash of NetSNMP in FAST360 appliances. |
|
Workaround solution |
Solution |
A patch is available in versions 5.0/35 and 6.0/9. These versions are available for download through our Early Access Release (EAR) program which can be accessed by registering to the community via https://open.arkoon.net/ear-acceder-a-nos-prochaines-version-en-avant-premiere These versions will be made publicly available through our main update servers on 29 Sepetember 2015. |
5.0/35 and 6.0/9 updates fix this vulnerability. You are strongly advised to update your appliances. |
Access vector | Access complexity | Authentication | Confidentiality impact | Integrity impact | Availability impact |
---|---|---|---|---|---|
Adjacent Network | High | None | None | None | Partial |
CVSS Base score: 1.8 | CVSS Vector: (AV:A/AC:H/Au:N/C:N/I:N/A:P) |
Exploitability | Remediation Level | Report Confidence |
---|---|---|
Unproven that exploit exists | Official fix | Confirmed |
CVSS Temporal score: 1.3 | CVSS Vector: (AV:A/AC:H/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C) |
Collateral Damage Potential | Target Distribution |
---|---|
Low | High [76-100%] |
CVSS Environmental score: 2.2 | CVSS Vector: (AV:A/AC:H/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C/CDP:L/TD:H/CR:ND/IR:ND/AR:ND) |

Netasq |
CVSS v2 Overall Score: 2.2
|
Analysis |
Impacted version |
A memory leak present in snmp_pdu_parse() could cause a crash of NetSNMP in Netasq appliances. |
|
Workaround solution |
Solution |
There is no workaround solution. |
The 9.1.8 update will fix this vulnerability. |
Access vector | Access complexity | Authentication | Confidentiality impact | Integrity impact | Availability impact |
---|---|---|---|---|---|
Adjacent Network | High | None | None | None | Partial |
CVSS Base score: 1.8 | CVSS Vector: (AV:A/AC:H/Au:N/C:N/I:N/A:P) |
Exploitability | Remediation Level | Report Confidence |
---|---|---|
Unproven that exploit exists | Official fix | Confirmed |
CVSS Temporal score: 1.3 | CVSS Vector: (AV:A/AC:H/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C) |
Collateral Damage Potential | Target Distribution |
---|---|
Low | High [76-100%] |
CVSS Environmental score: 2.2 | CVSS Vector: (AV:A/AC:H/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C/CDP:L/TD:H/CR:ND/IR:ND/AR:ND) |
