what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

nodemanager200.txt

nodemanager200.txt
Posted Jan 18, 2005
Authored by Tan Chew Keong

NodeManager Professional 2.00 has a stack overflow vulnerability that can be exploited by sending a specially crafted SNMPv1 trap.

tags | advisory, overflow
SHA-256 | 2f7c4455305f9277c5d6931bd82f3660f702734db4e9275b16d3c83827dfb989

nodemanager200.txt

Change Mirror Download


SIG^2 Vulnerability Research Advisory

NodeManager Professional V2.00 Buffer Overflow Vulnerability

by Tan Chew Keong
Release Date: 17 Jan 2005


ADVISORY URL
http://www.security.org.sg/vuln/nodemanager200.html


SUMMARY

NodeManager Professional (http://www.h4.dion.ne.jp/~you4707/NodeManagerPro.html) is a network management and monitoring tool. It receives SNMPv1 traps and displays them on screen and writes them to a log file. NodeManager Professional V2.00 has a stack overflow vulnerability that can be exploited by sending a specially crafted SNMPv1 trap.


TESTED SYSTEM

NodeManager Professional V2.00 on English Win2K SP4, WinXP SP1, SP2.


DETAILS

NodeManager Professional allows the user to use a format string to customize how each received SNMPv1 trap is logged. For example, the default format string for the LinkDown event is

"Snmp Trap LinkDown (EnterPrise=%EPRISE ObjectID=%OID Value=%DATA)"

When a LinkDown-Trap packet is received, the various placeholders (e.g. %OID, %DATA) will be replaced with the received values. When the format string is parsed, each received value is first copied to a 512-byte local stack buffer before it is concatenated to the final string. By sending a LinkDown-Trap packet containing an OCTET-STRING of more than 512 bytes in the Trap variable-bindings field, it is possible to overflow the stack buffer and overwrite the EIP. This happens when the %DATA placeholder is processed.


PATCH

Upgrade to version 2.01, which fixes this vulnerability.


DISCLOSURE TIMELINE

20 Dec 04 - Vulnerability Discovered
21 Dec 04 - Initial Author Notification
22 Dec 04 - Received Author's Reply
07 Jan 05 - Second Author Notification
11 Jan 05 - Second Author Reply
15 Jan 05 - Author Released Fixed Version
17 Jan 05 - Public Release


GREETINGS

All guys at SIG^2 G-TEC Lab
http://www.security.org.sg/webdocs/g-tec.html

"IT Security...the Gathering. By enthusiasts for enthusiasts."

Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close