SNMPc < 7.1.1 UDP Packet Handling Buffer Overflow

Critical Nessus Plugin ID 32081


A remote Windows host contains a program that is affected by a buffer overflow vulnerability.


The remote host is running SNMPc, a network management application for Windows from Castle Rock Computing.

The version of SNMPc installed on the remote host reportedly is affected by a stack-based buffer overflow vulnerability. Using a specially crafted SNMP TRAP packet with an overly long community string, an unauthenticated, remote attacker can able to leverage this issue to execute arbitrary code on the remote host with LocalSystem privileges.


Upgrade to SNMPc version 7.1.1 or later as that reportedly resolves the issue.

See Also

Plugin Details

Severity: Critical

ID: 32081

File Name: snmpc_7_1_1.nasl

Version: $Revision: 1.13 $

Type: local

Agent: windows

Family: Windows

Published: 2008/05/01

Modified: 2016/05/13

Dependencies: 13855

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Exploitable With

Core Impact

Reference Information

CVE: CVE-2008-2214

BID: 28990

OSVDB: 44885

Secunia: 30036

CWE: 119