This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.
A remote Windows host contains a program that is affected by a buffer
The remote host is running SNMPc, a network management application for
Windows from Castle Rock Computing.
The version of SNMPc installed on the remote host reportedly is
affected by a stack-based buffer overflow vulnerability. Using a
specially crafted SNMP TRAP packet with an overly long community
string, an unauthenticated, remote attacker can able to leverage this
issue to execute arbitrary code on the remote host with LocalSystem
See also :
Upgrade to SNMPc version 7.1.1 or later as that reportedly resolves
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.7
Public Exploit Available : true