RPC: Solaris snmpXdmid Buffer Overflow

This signature detects attempts to exploit a known vulnerability against snmpXdmid, the SNMP-to-DMI and DMI-to-SNMP mapper daemon in Solaris. Attackers can send a maliciously crafted DMI request, which the snmpXdmid attempts to translate into an SNMP trap, causing a buffer overflow, and allowing the attacker to execute arbitrary commands.

Extended Description

Versions 2.6, 7, and 8 of Sun Microsystem's Solaris operating environment ship with service called 'snmpXdmid'. This daemon is used to map SNMP management requests to DMI requests and vice versa. SnmpXdmid contains a remotely exploitable buffer overflow vulnerability. The overflow occurs when snmpXdmid attempts to translate a 'malicious' DMI request into an SNMP trap. SnmpXdmid runs with root privileges and any attacker to successfully exploit this vulnerability will gain superuser access immediately.

Affected Products

Sun solaris

Short Name
RPC:RPC.SNMPXDMID:OVERFLOW
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
RPC
Keywords
Buffer CA-2001-05 CVE-2001-0236 Overflow Solaris bid:2417 snmpXdmid
Release Date
04/22/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
Port
RPC/100249
False Positive
Unknown
Vendors

Sun

CVSS Score

10.0

Found a potential security threat?