SNMPc Management Server Login Packet Remote DoS

Medium Nessus Plugin ID 25424


The remote Windows host contains an application that is susceptible to a denial of service attack.


The remote host is running SNMPc, a network management application for Windows.

The version of SNMPc installed on the remote host reportedly will crash if a specially crafted logon packet is sent to its Management Server. An unauthenticated, remote attacker may be able to exploit this issue to crash the service and deny access to legitimate users.


Upgrade to SNMPc Management Server version 7.0.19 or later as that is supposed to address the issue.

Plugin Details

Severity: Medium

ID: 25424

File Name: snmpc_crserv_login_dos.nasl

Version: $Revision: 1.17 $

Type: local

Agent: windows

Family: Windows

Published: 2007/06/05

Modified: 2016/05/19

Dependencies: 13855

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 4.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:POC/RL:U/RC:ND

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2007/06/04

Reference Information

CVE: CVE-2007-3098

BID: 24292

OSVDB: 36916

EDB-ID: 4033