SNMP: Format String Exploit (TCP)

This signature detects attempts to exploit a known vulnerability in SNMP proxy servers. Attackers can include format string characters in a malformed SNMP message to take root control of the SNMP server.

Extended Description

Orinoco is the manufacturer of various wireless network components, including access points and network cards. It is possible to remotely gain access to the identification string used for configuration of OEM access points manufactured by Orinoco through SNMP. By sending a custom-crafted SNMP query to a vulnerable access point, the access point will return system credentials, including the identification string. This identification string can be used as the administrative community string.

Affected Products

Proxim orinoco_residential_gateway_rg-1000

Short Name
SNMP:FMT-STR-TCP
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
SNMP
Keywords
(TCP) CVE-2005-1246 Exploit Format String bid:5436
Release Date
05/10/2005
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
Port
TCP/161
False Positive
Unknown
Vendors

Proxim

Compaq

CVSS Score

10.0

Found a potential security threat?