Home page logo

bugtraq logo Bugtraq mailing list archives

Entercept Ricochet Security Advisory: Solaris snmpdx Vulnerabilities
From: "Entercept Ricochet Team" <Ricochet () entercept com>
Date: Tue, 4 Jun 2002 09:28:49 -0700

Entercept Ricochet Advisory
Solaris snmpdx Vulnerabilities

An unchecked buffer in Sun's Solaris SNMP component can be overrun and remotely exploited, allowing an attacker to 
execute arbitrary code with root privileges. There is also a format string vulnerability in Solaris that can be 
exploited, allowing a hacker to execute arbitrary code with root privileges.
The buffer overflow occurs in the MIB parsing component and the format string vulnerability in the logging component of 
snmpdx, which is installed by default with the Solaris Operating System. Exploiting these vulnerabilities would give an 
attacker complete control of the attacked server. 
Solaris 2.6, 7, and 8
Entercept worked closely with the Sun Security team, while they developed a patch. Information on the patch is 
available at Sun's Security Bulletin #00219 at http://sunsolve.sun.com/pub-cgi/secBulletin.pl.


Entercept's Ricochet team is a specialized group of security researchers dedicated to identifying, assessing, and 
evaluating intelligence regarding server threats. The Ricochet team researches current and future avenues of attack and 
builds this knowledge into Entercept's intrusion prevention solution. Ricochet is dedicated to providing critical, 
viable security content via security advisories and technical briefs. This content is designed to educate organizations 
and security professionals about the nature and severity of Internet security threats, vulnerabilities and exploits.

  By Date           By Thread  

Current thread:
  • Entercept Ricochet Security Advisory: Solaris snmpdx Vulnerabilities Entercept Ricochet Team (Jun 04)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]