Buffer overflow in the smiGetNode function in lib/smi.c in libsmi 0.4.8 allows context-dependent attackers to execute arbitrary code via an Object Identifier (aka OID) represented as a numerical string containing many components separated by . (dot) characters.
lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html
lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
secunia.com/advisories/41841
secunia.com/advisories/42877
secunia.com/advisories/42902
secunia.com/advisories/43068
security-tracker.debian.org/tracker/CVE-2010-2891
www.coresecurity.com/content/libsmi-smigetnode-buffer-overflow
www.debian.org/security/2011/dsa-2145
www.exploit-db.com/exploits/15293
www.mandriva.com/security/advisories?name=MDVSA-2010:209
www.securityfocus.com/archive/1/514382/100/0/threaded
www.securityfocus.com/bid/44276
www.vupen.com/english/advisories/2010/2764
www.vupen.com/english/advisories/2011/0076
www.vupen.com/english/advisories/2011/0111
www.vupen.com/english/advisories/2011/0212
exchange.xforce.ibmcloud.com/vulnerabilities/62686