Net-SNMP 5.0.x before 126.96.36.199, 5.2.x before 188.8.131.52, and 5.1.3, when
net-snmp is using stream sockets such as TCP, allows remote attackers to
cause a denial of service (daemon hang and CPU consumption) via a TCP
packet of length 1, which triggers an infinite loop.
Updated: 2016-03-23 03:25:12 UTC (commit 10817)