Check Point Reference: | CPAI-2008-106 |
Date Published: | 28 Jul 2008 |
Severity: | High |
Last Updated: | Tuesday 01 January, 2008 |
Source: | Secunia Advisory: SA30036 |
Industry Reference: | CVE-2008-2214 |
Protection Provided by: | |
Who is Vulnerable? | Castle Rock Computing SNMPc Network Manager 7.1 |
Vulnerability Description | A buffer overflow vulnerability has been discovered in Castle Rock Computing SNMPc Network Manager. Castle Rock Computing SNMPc is a secure distributed network management system that uses the Simple Network Management Protocol (SNMP) to communicate with other networks. A remote attacker may exploit this vulnerability to inject and execute arbitrary code on a target system. |
Update/Patch Avaliable | Update to version 7.1.1: Castle Rock Computing |
Vulnerability Details | The vulnerability is due to a boundary error in the SNMPc Network Manager when processing malformed SNMP TRAP packets. A remote attacker may trigger this vulnerability via an SNMP TRAP message with an overly long community string. Successful exploitation of this issue will allow the attacker to execute arbitrary code on the vulnerable system. |