SNMPc < 7.1.1 UDP Packet Handling Buffer Overflow

This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.


Synopsis :

A remote Windows host contains a program that is affected by a buffer
overflow vulnerability.

Description :

The remote host is running SNMPc, a network management application for
Windows from Castle Rock Computing.

The version of SNMPc installed on the remote host reportedly is
affected by a stack-based buffer overflow vulnerability. Using a
specially crafted SNMP TRAP packet with an overly long community
string, an unauthenticated, remote attacker can able to leverage this
issue to execute arbitrary code on the remote host with LocalSystem
privileges.

See also :

http://www.ngssoftware.com/advisories/critical-vulnerability-in-snmpc/
http://www.securityfocus.com/archive/1/491454

Solution :

Upgrade to SNMPc version 7.1.1 or later as that reportedly resolves
the issue.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 32081 ()

Bugtraq ID: 28990

CVE ID: CVE-2008-2214

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now