Vulnerabilities recently patched in Mini-SNMPD could be abused for denial-of-service (DoS) attacks or to obtain sensitive information, Cisco Talos’ security researchers report.
Mini-SNMPD is a lightweight implementation of a Simple Network Management Protocol server, mainly targeted at embedded systems, courtesy of its small code size and memory footprint. It works on both x86 and ARM platforms running Ubuntu, Alpine Linux, and FreeBSD.
Talos’ researchers discovered a total of three vulnerabilities in Mini-SNMPD, including two out-of-bounds read bugs and one stack overflow.
Tracked as CVE-2020-6058 and CVE-2020-6059, the first two issues are exploitable out-of-bounds read vulnerabilities, both related to the manner in which Mini-SNMPD parses incoming SNMP packets.
An attacker looking to trigger these flaws can do so by sending a specially crafted packet to the vulnerable server. Both flaws could be exploited to obtain sensitive information or cause a DoS condition.
The third security bug, which is tracked as CVE-2020-6060, exists in the way Mini-SNMPD handles multiple connections, Talos explains. The flaw can be triggered by an attacker who can initiate a specially timed sequence of SNMP connections to the vulnerable server.
All three vulnerabilities were found to impact version 1.4 of Mini-SNMPD and were reported to the developer on January 21. They have been patched with the release of Mini-SNMPD version 1.5.