Gentoo Linux Security Advisory 201312-10 - A buffer overflow in libsmi might allow a context-dependent attacker to execute arbitrary code. Versions less than 0.4.8-r1 are affected.
6aa435a29cce58ebaef5ee97b49c52c0045e0a66e59825d2106d819f7b61b00c
Debian Linux Security Advisory 2145-1 - Andres Lopez Luksenberg discovered a buffer overflow in the OID parser of libsmi, a library to access SMI MIB data.
e78816eee8da8bbb98bc8e6fabaa42e0607c5711df3495d32c45fab2f9fb44dc
Mandriva Linux Security Advisory 2010-209 - A buffer overflow was discovered in libsmi when long OID was given in numerical form. This could lead to arbitrary code execution.
cf7b44c0abecb921f207fc7f27c5244f40e3f24c3167eb87026c2974168fe890
Core Security Technologies Advisory - A statically allocated buffer is overwritten in the case that a very long Object Identifier is specified in stringified dotted notation to the smiGetNode function of libsmi. This may result in arbitrary code execution by cleverly overwriting key pointers in memory.
16f418d01c3fe817c1a749abcd16851913080fe6ee2a92f1103496773afe342b