CERT Advisory CA-2002-03 describes a series of tests designed to determine the vulnerability of SNMP implementations. Juniper Networks has evaluated its software using the provided test suites, and has determined that, with one exception, the JUNOS Internet software is not vulnerable to any of the potential exploits. The only vulnerability found occurred when SNMP PDU tracing was enabled (snmp traceoptions flag pdu). With this trace flag enabled, certain invalid SNMP varbinds can cause the SNMP process to overflow a buffer and terminate. Although one could theoretically use this buffer overflow to gain root access to the router, no known exploit code exists.