First published: Wed Jan 18 2006(Updated: )
Format string vulnerability in the snmp_input function in snmptrapd in CMU SNMP utilities (cmu-snmp) allows remote attackers to execute arbitrary code by sending crafted SNMP messages to UDP port 162.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Snmptrapd | =3.6 | |
Snmptrapd | =3.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0250 is classified as a high-severity vulnerability due to its potential for arbitrary code execution.
To fix CVE-2006-0250, upgrade to version 3.8 or later of the Carnegie Mellon University Snmptrapd.
CVE-2006-0250 can be exploited by remote attackers through crafted SNMP messages sent to UDP port 162.
CVE-2006-0250 affects version 3.6 and 3.7 of Carnegie Mellon University Snmptrapd.
CVE-2006-0250 is not environment specific and can be exploited in any environment running the affected versions of snmptrapd.