"evaluatorImpact":"Failed exploit attempts will likely cause a denial of serivce on the webserver.",
"descriptions":[
{
"lang":"en",
"value":"Buffer overflow in the snmpget function in the snmp extension in PHP 5.2.3 and earlier, including PHP 4.4.6 and probably other PHP 4 versions, allows context-dependent attackers to execute arbitrary code via a long value in the third argument (object id)."
},
{
"lang":"es",
"value":"Un desbordamiento de b\u00fafer en la funci\u00f3n snmpget en la extensi\u00f3n snmp en PHP versi\u00f3n 5.2.3 y anteriores, incluyendo a PHP versi\u00f3n 4.4.6 y probablemente otras versiones 4 de PHP, permite a atacantes dependiendo del contexto ejecutar c\u00f3digo arbitrario por medio de un valor largo en el tercer argumento (id del objeto)."
}
],
"vendorComments":[
{
"organization":"Red Hat",
"comment":"Not vulnerable. The php-snmp package as shipped with Red Hat Enterprise Linux 4 and 5 use net-snmp which is not vulnerable to this issue.\n",