Net-SNMP 5.0.x before 184.108.40.206, 5.2.x before 220.127.116.11, and 5.1.3, when
net-snmp is using stream sockets such as TCP, allows remote attackers to
cause a denial of service (daemon hang and CPU consumption) via a TCP
packet of length 1, which triggers an infinite loop.
Updated: 2015-07-29 20:26:09 UTC (commit 9756)