Castle.Rock.SNMPc.Trap.Community.Buffer.Overflow
Description
This indicates an attack attempt against a buffer-overflow vulnerability in Castle Rock Computing SNMPc Network Manager.
The vulnerability is caused by a boundary error when processing an overly long community string in the SNMP TRAP message. A remote attacker may exploit this to execute arbitrary code or cause a denial-of-service (DoS) condition.
Affected Products
Castle Rock Computing SNMPc 7.0.19
Castle Rock Computing SNMPc 7.0.18
Castle Rock Computing SNMPc 6.0.8
Castle Rock Computing SNMPc 6.0.5
Castle Rock Computing SNMPc 6.0
Castle Rock Computing SNMPc 5.1.9
Castle Rock Computing SNMPc 5.1
Castle Rock Computing SNMPc 7.1
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Denial of Service: Remote attackers can crash vulnerable systems.
Recommended Actions
Upgrade to the latest version of SNMPc (7.1.1 or later):
http://www.castlerock.com/
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |