Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

SNMP:FMT-STR-TCP

Severity

Critical

Recommended

No

Recommended Action

Drop

Category

SNMP

Keywords

Format String Exploit (TCP)

Release Date

2005/05/10

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

SNMP: Format String Exploit (TCP)


This signature detects attempts to exploit a known vulnerability in SNMP proxy servers. Attackers can include format string characters in a malformed SNMP message to take root control of the SNMP server.

Extended Description

Orinoco is the manufacturer of various wireless network components, including access points and network cards. It is possible to remotely gain access to the identification string used for configuration of OEM access points manufactured by Orinoco through SNMP. By sending a custom-crafted SNMP query to a vulnerable access point, the access point will return system credentials, including the identification string. This identification string can be used as the administrative community string.

Affected Products

  • Compaq Wireless LAN WL310
  • Proxim Orinoco Residential Gateway RG-1000

References

  • BugTraq: 5436
  • CVE: CVE-2005-1246
  • URL: http://www.frsirt.com/exploits/20050429.Snmppd.c.php
  • URL: http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0075.html
  • URL: http://www.securiteam.com/exploits/5HP090AFPS.html

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out