{"id":"CVE-2022-44792","details":"handle_ipDefaultTTL in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.8 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker (who has write access) to cause the instance to crash via a crafted UDP packet, resulting in Denial of Service.","modified":"2026-03-14T11:57:20.837611Z","published":"2022-11-07T03:15:09.303Z","related":["ALSA-2023:2444","ALSA-2023:2969","MGASA-2023-0015","SUSE-SU-2023:0068-1","SUSE-SU-2023:0075-1"],"references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00010.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20230223-0011/"},{"type":"REPORT","url":"https://github.com/net-snmp/net-snmp/issues/474"},{"type":"EVIDENCE","url":"https://gist.github.com/menglong2234/b7bc13ae1a144f47cc3c95a7ea062428"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/net-snmp/net-snmp","events":[{"introduced":"463235edcc53e2477efe35da717fab292741aab5"},{"last_affected":"0175f031c1bd902bf9fbd5c698298f645f449606"}],"database_specific":{"versions":[{"introduced":"5.8"},{"last_affected":"5.9.3"}]}}],"versions":["v5.8","v5.8.1.pre1","v5.8.1.pre2","v5.8.1.rc1","v5.9","v5.9.1","v5.9.1.pre1","v5.9.1.rc1","v5.9.2","v5.9.2.pre1","v5.9.2.rc1","v5.9.2.rc2","v5.9.3","v5.9.3.rc1","v5.9.rc2","v5.9.verfix"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-44792.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}