Vulnerability Description
Sunway ForceControl version 6.1 SP3 and earlier contains a stack-based buffer overflow vulnerability in the SNMP NetDBServer service, which listens on TCP port 2001. The flaw is triggered when the service receives a specially crafted packet using opcode 0x57 with an overly long payload. Due to improper bounds checking during packet parsing, attacker-controlled data overwrites the Structured Exception Handler (SEH), allowing arbitrary code execution in the context of the service. This vulnerability can be exploited remotely without authentication and may lead to full system compromise on affected Windows hosts.
Related Weaknesses (CWE)
References
- http://aluigi.altervista.org/adv/forcecontrol_1-adv.txt
- http://www.sunwayland.com/
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exp
- https://web.archive.org/web/20110611043512/http://www.sunwayland.com.cn/pro.asp
- https://www.exploit-db.com/exploits/18448
- https://www.fortiguard.com/encyclopedia/ips/29449
- https://www.vulncheck.com/advisories/sunway-forcecontrol-snmp-netdbserver-opcode
FAQ
What is CVE-2011-10032?
CVE-2011-10032 is a documented vulnerability. Sunway ForceControl version 6.1 SP3 and earlier contains a stack-based buffer overflow vulnerability in the SNMP NetDBServer service, which listens on TCP port 2001. The flaw is triggered when the ser...
How severe is CVE-2011-10032?
CVSS scoring is not yet available for CVE-2011-10032. Check NVD for updates.
Is there a patch for CVE-2011-10032?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.