Table of Contents

Public Date:
447974: CVE-2008-0960 net-snmp SNMPv3 authentication bypass (VU#877044)

The MITRE CVE dictionary describes this issue as:

SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before, 5.3.x before, and 5.4.x before; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.

Find out more about CVE-2008-0960 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 5.8
Base Metrics AV:N/AC:M/Au:N/C:P/I:P/A:N
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 2.1 (ucd-snmp) RHSA-2008:0528 2008-06-10
Red Hat Enterprise Linux 4 (net-snmp) RHSA-2008:0529 2008-06-10
Red Hat Enterprise Linux Extended Update Support 4.5 RHSA-2008:0529 2008-06-10
Red Hat Enterprise Linux 5 (net-snmp) RHSA-2008:0529 2008-06-10
Red Hat Enterprise Linux 3 (net-snmp) RHSA-2008:0529 2008-06-10
Last Modified

CVE description copyright © 2017, The MITRE Corporation