Vulnerability Note VU#648304
Sun Solaris DMI to SNMP mapper daemon snmpXdmid contains buffer overflow
There is a buffer overflow in the snmpXdmi daemon, which may allow intruders to gain root privileges on systems running the vulnerable daemon.
The SNMP-to-DMI mapper daemon (snmpXdmi) translates Simple Network Management Protocol (SNMP) events to Desktop Management Interface (DMI) indications and vice-versa. Both protocols serve a similar purpose, and the translation daemon allows users to manage devices using either protocol. The snmpXdmi daemon registers itself with the snmpdx and dmid daemons, translating and forwarding requests from one daemon to the other. The snmpXdmi daemon, which is shipped with Solaris versions 2.6, 7 and 8, is enabled by default.
The snmpXdmi daemon contains a buffer overflow in the code for translating DMI indications to SNMP events. This buffer overflow is exploitable by remote intruders to gain root privileges.
A remote intruder who is able to send packets to the snmpXdmi daemon may be able to gain root privileges on that system.
Apply a Patch
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Sun||Affected||08 Mar 2001||14 Sep 2001|
CVSS Metrics (Learn More)
Thanks to Job de Haas (firstname.lastname@example.org) of ITSX BV Amsterdam, The Netherlands (http://www.itsx.com) for reporting this vulnerability to the CERT/CC.
This document was written by Cory F. Cohen.
- CVE IDs: CAN-2001-0236
- CERT Advisory: CA-2001-05
- Date Public: 15 Mar 2001
- Date First Published: 26 Mar 2001
- Date Last Updated: 14 Sep 2001
- Severity Metric: 14.06
- Document Revision: 21
If you have feedback, comments, or additional information about this vulnerability, please send us email.