SNMPc < 7.1.1 UDP Packet Handling Buffer Overflow

critical Nessus Plugin ID 32081

Synopsis

A remote Windows host contains a program that is affected by a buffer overflow vulnerability.

Description

The remote host is running SNMPc, a network management application for Windows from Castle Rock Computing.

The version of SNMPc installed on the remote host reportedly is affected by a stack-based buffer overflow vulnerability. Using a specially crafted SNMP TRAP packet with an overly long community string, an unauthenticated, remote attacker can able to leverage this issue to execute arbitrary code on the remote host with LocalSystem privileges.

Solution

Upgrade to SNMPc version 7.1.1 or later as that reportedly resolves the issue.

See Also

http://www.ngssoftware.com/advisories/critical-vulnerability-in-snmpc/

https://www.securityfocus.com/archive/1/491454

Plugin Details

Severity: Critical

ID: 32081

File Name: snmpc_7_1_1.nasl

Version: 1.15

Type: local

Agent: windows

Family: Windows

Published: 5/1/2008

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Exploitable With

Core Impact

Reference Information

CVE: CVE-2008-2214

BID: 28990

CWE: 119

Secunia: 30036