{"id":"CVE-2008-2292","details":"Buffer overflow in the __snprint_value function in snmp_get in Net-SNMP 5.1.4, 5.2.4, and 5.4.1, as used in SNMP.xs for Perl, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large OCTETSTRING in an attribute value pair (AVP).","modified":"2026-01-27T04:08:44.082634Z","published":"2008-05-18T14:20:00Z","withdrawn":"2026-01-27T04:08:44.082634Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/30187"},{"type":"ADVISORY","url":"http://secunia.com/advisories/30615"},{"type":"ADVISORY","url":"http://secunia.com/advisories/30647"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31155"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31334"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31351"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31467"},{"type":"ADVISORY","url":"http://secunia.com/advisories/31568"},{"type":"ADVISORY","url":"http://secunia.com/advisories/32664"},{"type":"ADVISORY","url":"http://secunia.com/advisories/33003"},{"type":"ADVISORY","url":"http://security.gentoo.org/glsa/glsa-200808-02.xml"},{"type":"ADVISORY","url":"http://www.debian.org/security/2008/dsa-1663"},{"type":"ADVISORY","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2008:118"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/usn-685-1"},{"type":"ADVISORY","url":"http://www.vmware.com/security/advisories/VMSA-2008-0013.html"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/1528/references"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2141/references"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2008/2361"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html"},{"type":"WEB","url":"http://sourceforge.net/tracker/index.php?func=detail&aid=1826174&group_id=12694&atid=112694"},{"type":"WEB","url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-239785-1"},{"type":"WEB","url":"http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm"},{"type":"WEB","url":"http://www.redhat.com/support/errata/RHSA-2008-0529.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/29212"},{"type":"WEB","url":"http://www.securitytracker.com/id?1020527"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/42430"},{"type":"WEB","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11261"},{"type":"WEB","url":"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html"},{"type":"WEB","url":"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html"},{"type":"WEB","url":"https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html"}],"schema_version":"1.7.3"}