net-snmp is a SNMP application library, tools and daemon. Prior to versions 5.9.5 and 5.10.pre2, a specially crafted packet to an net-snmp snmptrapd daemon can cause a buffer overflow and the daemon to crash. This issue has been patched in versions 5.9.5 and 5.10.pre2.
References
| Link | Resource |
|---|---|
| https://github.com/net-snmp/net-snmp/security/advisories/GHSA-4389-rwqf-q9gq | Vendor Advisory |
| http://www.openwall.com/lists/oss-security/2026/01/09/2 | Mailing List Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2026/01/msg00000.html | Vendor Advisory Mailing List |
| https://www.vicarius.io/vsociety/posts/cve-2025-68615-detection-script-buffer-overflow-vulnerability-affecting-net-snmp | Mitigation Third Party Advisory Exploit |
| https://www.vicarius.io/vsociety/posts/cve-2025-68615-mitigation-script-buffer-overflow-vulnerability-affecting-net-snmp | Mitigation Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-23 00:15
Updated : 2026-02-19 16:09
NVD link : CVE-2025-68615
Mitre link : CVE-2025-68615
CVE.ORG link : CVE-2025-68615
JSON object : View
Products Affected
net-snmp
- net-snmp
debian
- debian_linux
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
