It is reported that the UCD-SNMP 'snmpd' daemon is prone to a command line parsing buffer overflow vulnerability. This issue is due to a failure of the application to properly validate the size of user-supplied argument strings before copying them into a finite buffer. This issue may permit a local attacker to influence execution flow of the affected snmpd daemon, and ultimately execute arbitrary instructions in the context of the process. This vulnerability is reported to affect UCD-SNMP versions up to an including version 4.2.6.
It is reported that the UCD-SNMP 'snmpd' daemon is prone to a command line parsing buffer overflow vulnerability. This issue is due to a failure of the application to properly validate the size of user-supplied argument strings before copying them into a finite buffer. This issue may permit a local attacker to influence execution flow of the affected snmpd daemon, and ultimately execute arbitrary instructions in the context of the process. This vulnerability is reported to affect UCD-SNMP versions up to an including version 4.2.6.