Net-SNMP 5.0.x before 220.127.116.11, 5.2.x before 18.104.22.168, and 5.1.3, when
net-snmp is using stream sockets such as TCP, allows remote attackers to
cause a denial of service (daemon hang and CPU consumption) via a TCP
packet of length 1, which triggers an infinite loop.
Updated: 2016-03-23 03:25:12 UTC (commit 10817)