Check Point Advisories

Preemptive Protection against Castle Rock Computing SNMPc Network Manager Community String Stack Vulnerability

Check Point Reference: CPAI-2008-106
Date Published: 28 Jul 2008
Severity: High
Last Updated: Tuesday 01 January, 2008
Source: Secunia Advisory: SA30036
Industry Reference:CVE-2008-2214
Protection Provided by:
Who is Vulnerable? Castle Rock Computing SNMPc Network Manager 7.1
Vulnerability Description A buffer overflow vulnerability has been discovered in Castle Rock Computing SNMPc Network Manager. Castle Rock Computing SNMPc is a secure distributed network management system that uses the Simple Network Management Protocol (SNMP) to communicate with other networks. A remote attacker may exploit this vulnerability to inject and execute arbitrary code on a target system.
Update/Patch AvaliableUpdate to version 7.1.1:
Castle Rock Computing
Vulnerability DetailsThe vulnerability is due to a boundary error in the SNMPc Network Manager when processing malformed SNMP TRAP packets. A remote attacker may trigger this vulnerability via an SNMP TRAP message with an overly long community string. Successful exploitation of this issue will allow the attacker to execute arbitrary code on the vulnerable system.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK