The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


CERT Advisory CA-2002-03 Multiple Vulnerabilities in Many Implementations


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Tue, 12 Feb 2002 14:38:58 -0500 (EST)
From: CERT Advisory <[email protected]>
To: [email protected]
Subject: CERT Advisory CA-2002-03 Multiple Vulnerabilities in Many Implementations



-----BEGIN PGP SIGNED MESSAGE-----

CERT Advisory CA-2002-03: Multiple Vulnerabilities in Many
Implementations of the Simple Network Management Protocol (SNMP)

   Original release date: February 12, 2002
   Last revised: --
   Source: CERT/CC

   A complete revision history can be found at the end of this file.

Systems Affected

   Products  from  a  very  wide  variety of vendors may be affected. See
   Vendor Information for details from vendors who have provided feedback
   for this advisory.

   In  addition to the vendors who provided feedback for this advisory, a
   list  of  vendors  whom  CERT/CC contacted regarding these problems is
   available from
   http://www.kb.cert.org/vuls/id/854306
   http://www.kb.cert.org/vuls/id/107186 

   Many  other systems making use of SNMP may also be vulnerable but were
   not specifically tested.

Overview

   Numerous  vulnerabilities have been reported in multiple vendors' SNMP
   implementations.   These   vulnerabilities   may   allow  unauthorized
   privileged   access,  denial-of-service  attacks,  or  cause  unstable
   behavior.  If  your  site  uses  SNMP  in  any  capacity,  the CERT/CC
   encourages you to read this advisory and follow the advice provided in
   the Solution section below.

   In addition to this advisory, we also have an FAQ available at
   http://www.cert.org/tech_tips/snmp_faq.html

I. Description

   The  Simple  Network  Management  Protocol (SNMP) is a widely deployed
   protocol  that is commonly used to monitor and manage network devices.
   Version  1  of  the  protocol  (SNMPv1)  defines several types of SNMP
   messages  that  are  used  to  request  information  or  configuration
   changes,  respond  to  requests,  enumerate  SNMP  objects,  and  send
   unsolicited  alerts.  The  Oulu  University  Secure  Programming Group
   (OUSPG,  http://www.ee.oulu.fi/research/ouspg/)  has reported numerous
   vulnerabilities in SNMPv1 implementations from many different vendors.
   More information about SNMP and OUSPG can be found in Appendix C

   OUSPG's  research  focused  on  the  manner in which SNMPv1 agents and
   managers  handle  request  and  trap  messages. By applying the PROTOS
   c06-snmpv1 test suite
   (http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/snmpv1/0100.h
   tml)  to  a  variety  of  popular  SNMPv1-enabled  products, the OUSPG
   revealed the following vulnerabilities:

   VU#107186 - Multiple vulnerabilities in SNMPv1 trap handling 

     SNMP trap messages are sent from agents to managers. A trap message
     may  indicate  a warning or error condition or otherwise notify the
     manager about the agent's state. SNMP managers must properly decode
     trap  messages  and  process  the resulting data. In testing, OUSPG
     found multiple vulnerabilities in the way many SNMP managers decode
     and process SNMP trap messages.

   VU#854306 - Multiple vulnerabilities in SNMPv1 request handling 

     SNMP  request  messages  are  sent from managers to agents. Request
     messages  might be issued to obtain information from an agent or to
     instruct  the  agent to configure the host device. SNMP agents must
     properly decode request messages and process the resulting data. In
     testing,  OUSPG found multiple vulnerabilities in the way many SNMP
     agents decode and process SNMP request messages.

   Vulnerabilities  in  the  decoding  and  subsequent processing of SNMP
   messages  by  both managers and agents may result in denial-of-service
   conditions,  format string vulnerabilities, and buffer overflows. Some
   vulnerabilities  do  not  require  the SNMP message to use the correct
   SNMP community string.

   These   vulnerabilities   have   been  assigned  the  CVE  identifiers
   CAN-2002-0012 and CAN-2002-0013, respectively.

II. Impact

   These  vulnerabilities may cause denial-of-service conditions, service
   interruptions,  and in some cases may allow an attacker to gain access
   to  the  affected  device.  Specific impacts will vary from product to
   product.

III. Solution

   Note  that  many  of  the  mitigation steps recommended below may have
   significant  impact on your everyday network operations and/or network
   architecture.  Ensure  that  any  changes  made based on the following
   recommendations  will  not  unacceptably  affect  your ongoing network
   operations capability.

Apply a patch from your vendor

   Appendix A contains information provided by vendors for this advisory.
   Please  consult this appendix to determine if you need to contact your
   vendor directly.

Disable the SNMP service

   As  a  general  rule,  the CERT/CC recommends disabling any service or
   capability   that   is   not   explicitly  required,  including  SNMP.
   Unfortunately,  some  of  the  affected  products exhibited unexpected
   behavior  or  denial  of  service conditions when exposed to the OUSPG
   test  suite  even  if  SNMP was not enabled. In these cases, disabling
   SNMP should be used in conjunction with the filtering practices listed
   below to provide additional protection.

Ingress filtering

   As a temporary measure, it may be possible to limit the scope of these
   vulnerabilities  by  blocking  access  to SNMP services at the network
   perimeter.

   Ingress  filtering  manages the flow of traffic as it enters a network
   under  your  administrative  control.  Servers  are typically the only
   machines that need to accept inbound traffic from the public Internet.
   In  the  network usage policy of many sites, there are few reasons for
   external hosts to initiate inbound traffic to machines that provide no
   public  services.  Thus,  ingress filtering should be performed at the
   border   to   prohibit   externally   initiated   inbound  traffic  to
   non-authorized  services. For SNMP, ingress filtering of the following
   ports  can  prevent  attackers  outside of your network from impacting
   vulnerable  devices  in  the  local  network  that  are not explicitly
   authorized to provide public SNMP services.

   snmp     161/udp     # Simple Network Management Protocol (SNMP)
   snmp     162/udp     # SNMP system management messages

   The  following  services  are  less  common,  but  may be used on some
   affected products

   snmp               161/tcp     #  Simple  Network  Management Protocol
   (SNMP)
   snmp               162/tcp     # SNMP system management messages
   smux               199/tcp     # SNMP Unix Multiplexer
   smux               199/udp     # SNMP Unix Multiplexer
   synoptics-relay    391/tcp     # SynOptics SNMP Relay Port
   synoptics-relay    391/udp     # SynOptics SNMP Relay Port
   agentx             705/tcp     # AgentX
   snmp-tcp-port     1993/tcp     # cisco SNMP TCP port
   snmp-tcp-port     1993/udp     # cisco SNMP TCP port

   As  noted  above, you should carefully consider the impact of blocking
   services that you may be using.

   It  is  important  to note that in many SNMP implementations, the SNMP
   daemon may bind to all IP interfaces on the device. This has important
   consequences  when  considering  appropriate packet filtering measures
   required  to  protect  an  SNMP-enabled device. For example, even if a
   device  disallows  SNMP  packets  directed  to the IP addresses of its
   normal  network  interfaces, it may still be possible to exploit these
   vulnerabilities  on that device through the use of packets directed at
   the following IP addresses:
     * "all-ones" broadcast address
     * subnet broadcast address
     * any  internal  loopback  addresses  (commonly  used in routers for
       management purposes, not to be confused with the IP stack loopback
       address 127.0.0.1)

   Careful  consideration  should  be  given  to  addresses  of the types
   mentioned  above  by  sites  planning  for packet filtering as part of
   their mitigation strategy for these vulnerabilities.

   Finally,  sites may wish to block access to the following RPC services
   related to SNMP (listed as name, program ID, alternate names)

   snmp               100122  na.snmp snmp-cmc snmp-synoptics snmp-unisys
   snmp-utk
   snmpv2             100138  na.snmpv2     # SNM Version 2.2.2
   snmpXdmid          100249

   Please  note  that  this workaround may not protect vulnerable devices
   from internal attacks.

Filter SNMP traffic from non-authorized internal hosts

   In  many networks, only a limited number of network management systems
   need to originate SNMP request messages. Therefore, it may be possible
   to configure the SNMP agent systems (or the network devices in between
   the  management  and  agent systems) to disallow request messages from
   non-authorized systems. This can reduce, but not wholly eliminate, the
   risk  from  internal attacks. However, it may have detrimental effects
   on  network  performance  due  to  the  increased  load imposed by the
   filtering, so careful consideration is required before implementation.
   Similar  caveats  to  the  previous workaround regarding broadcast and
   loopback addresses apply.

Change default community strings

   Most  SNMP-enabled  products  ship  with  default community strings of
   "public"  for read-only access and "private" for read-write access. As
   with   any   known  default  access  control  mechanism,  the  CERT/CC
   recommends  that network administrators change these community strings
   to  something  of  their  own  choosing.  However, even when community
   strings  are changed from their defaults, they will still be passed in
   plaintext and are therefore subject to packet sniffing attacks. SNMPv3
   offers additional capabilities to ensure authentication and privacy as
   described in RFC2574.

   Because  many of the vulnerabilities identified in this advisory occur
   before  the  community  strings are evaluated, it is important to note
   that  performing  this  step  alone  is not sufficient to mitigate the
   impact  of  these vulnerabilities. Nonetheless, it should be performed
   as part of good security practice.

Segregate SNMP traffic onto a separate management network

   In  situations  where  blocking  or  disabling  SNMP  is not possible,
   exposure  to  these  vulnerabilities may be limited by restricting all
   SNMP  access  to  separate,  isolated management networks that are not
   publicly  accessible.  Although  this would ideally involve physically
   separate networks, that kind of separation is probably not feasible in
   most environments. Mechanisms such as virtual LANs (VLANs) may be used
   to  help  segregate  traffic  on  the same physical network. Note that
   VLANs  may  not  strictly  prevent  an  attacker from exploiting these
   vulnerabilities,  but  they may make it more difficult to initiate the
   attacks.

   Another  option  is  for  sites  to  restrict SNMP traffic to separate
   virtual private networks (VPNs), which employ cryptographically strong
   authentication.

   Note  that  these  solutions may require extensive changes to a site's
   network architecture.

Egress filtering

   Egress  filtering  manages  the flow of traffic as it leaves a network
   under your administrative control. There is typically limited need for
   machines providing public services to initiate outbound traffic to the
   Internet.  In  the  case  of  SNMP  vulnerabilities,  employing egress
   filtering on the ports listed above at your network border can prevent
   your network from being used as a source for attacks on other sites.

Disable stack execution

   Disabling  executable  stacks  (on systems where this is configurable)
   can  reduce  the  risk  of  "stack  smashing"  attacks  based on these
   vulnerabilities. Although this does not provide 100 percent protection
   against exploitation of these vulnerabilities, it makes the likelihood
   of a successful exploit much smaller. On many UNIX systems, executable
   stacks can be disabled by adding the following lines to /etc/system:

   set noexec_user_stack = 1 set noexec_user_stack_log = 1

   Note  that  this  may  go  against the SPARC and Intel ABIs and can be
   bypassed  as required in programs with mprotect(2). For the changes to
   take effect you will then need to reboot.

   Other  operating  systems and architectures also support the disabling
   of executable stacks either through native configuration parameters or
   via  third-party  software.  Consult  your  vendor(s)  for  additional
   information.

Share tools and techniques

   Because  dealing with these vulnerabilities to systems and networks is
   so  complex, the CERT/CC will provide a forum where administrators can
   share  ideas  and  techniques  that  can  be  used  to  develop proper
   defenses.  We  have created an unmoderated mailing list for system and
   network administrators to discuss helpful techniques and tools.

   You  can  subscribe to the mailing list by sending an email message to
   [email protected]. In the body of the message, type

   subscribe snmp-forum

   After you receive the confirmation message, follow the instructions in
   the message to complete the subscription process.

Appendix A. - Vendor Information

   This  appendix  contains  information  provided  by  vendors  for this
   advisory.  As  vendors  report new information to the CERT/CC, we will
   update this section and note the changes in our revision history. If a
   particular  vendor  is  not  listed  below, we have not received their
   comments.

AdventNet

     This  is in reference to your notification regarding [VU#107186 and
     VU#854306]  and  OUSPG#0100.   AdventNet  Inc.  has reproduced this
     behavior  in  their  products and coded a Service Pack fix which is
     currently   in   regression   testing   in  AdventNet  Inc.'s  Q.A.
     organization.    The  release  of  AdventNet  Inc's.  Service  Pack
     correcting  the  behavior  outlined in VU#617947, and OUSPG#0100 is
     scheduled  to  be  generally  available  to all of AdventNet Inc.'s
     customers by February 20, 2002.

Avaya

     Avaya  Inc.  acknowledges the potential of SNMP vulnerabilities and
     is
     currently   investigating   whether  these  vulnerabilities  impact
     Avaya's products
     or solutions. No further information is available at this time.

CacheFlow

     The  purpose of this email is to advise you that CacheFlow Inc. has
     provided a software update. Please be advised that updated versions
     of  the  software  are  now  available  for all supported CacheFlow
     hardware  platforms,  and may be obtained by CacheFlow customers at
     the following URL:

          http://download.cacheflow.com/

   The  specific reference to the software update is contained within the
   Release  Notes  for  CacheOS  Versions 3.1.22 Release ID 17146, 4.0.15
   Release ID 17148, 4.1.02 Release ID 17144 and 4.0.15 Release ID 17149.

   RELEASE NOTES FOR CACHEFLOW SERVER ACCELERATOR PRODUCTS:
     * http://download.cacheflow.com/release/SA/4.0.15/relnotes.htm

   RELEASE NOTES FOR CACHEFLOW CONTENT ACCELERATOR PRODUCTS:
     * http://download.cacheflow.com/release/CA/3.1.22/relnotes.htm
     * http://download.cacheflow.com/release/CA/4.0.15/relnotes.htm
     * http://download.cacheflow.com/release/CA/4.1.02/relnotes.htm

     * SR   1-1647517,   VI  13045:  This  update  modified  a  potential
     vulnerability by using an SNMP test tools exploit.

3Com Corporation

     A  vulnerability to an SNMP packet with an invalid length community
     string  has  been  resolved  in  the  following products. Customers
     concerned  about  this  weakness should ensure that they upgrade to
     the following agent versions:
     PS Hub 40
     2.16 is due Feb 2002
     PS Hub 50
     2.16 is due Feb 2002
     Dual Speed Hub
     2.16 is due Jan 2002
     Switch 1100/3300
     2.68 is available now
     Switch 4400
     2.02 is available now
     Switch 4900
     2.04 is available now
     WebCache1000/3000
     2.00 is due Jan 2002

Caldera

     Caldera   International,  Inc.  has  reproduced  faulty behavior in
     Caldera SCO OpenServer 5, Caldera UnixWare 7, and Caldera Open UNIX
     8.  We have coded a software fix for  supported versions of Caldera
     UnixWare  7  and  Caldera  Open UNIX 8 that will  be available from
     our   support   site  at  http://stage.caldera.com/support/security
     immediately  following the publication of this CERT announcement. A
     fix  for  supported versions of OpenServer 5 will be available at a
     later date.

Cisco Systems

     Cisco  Systems  is  addressing  the  vulnerabilities  identified by
     VU#854306  and VU#107186 across its entire product line. Cisco will
     publish    a    security   advisory   with   further   details   at
     http://www.cisco.com/go/psirt/.

Compaq Computer Corporation

     x-ref: SSRT0779U SNMP
     At  the time of writing this document, COMPAQ continues to evaluate
     this potential problem and when new versions of SNMP are available,
     COMPAQ  will implement solutions based on the new code. Compaq will
     provide  notice  of  any  new  patches  as  a result of that effort
     through  standard  patch  notification  procedures and be available
     from your normal Compaq Services support channel.

Computer Associates

     Computer  Associates  has  confirmed Unicenter vulnerability to the
     SNMP  advisory identified by CERT notification reference [VU#107186
     &   VU#854306]   and   OUSPG#0100.   We  have  produced  corrective
     maintenance  to  address  these  vulnerabilities,  which  is in the
     process  of publication for all applicable releases / platforms and
     will  be  offered  through the CA Support site.  Please contact our
     Technical    Support   organization   for   information   regarding
     availability / applicability for your specific configuration(s).

COMTEK Services, Inc.

     NMServer  for  AS/400  is  not  an SNMP master and is therefore not
     vulnerable.  However  this  product  requires the use of the AS/400
     SNMP  master  agent  supplied  by  IBM.  Please  refer  to  IBM for
     statements of vulnerabilities for the AS/400 SNMP master agent.

     NMServer   for  OpenVMS  has  been  tested  and  has  shown  to  be
     vulnerable.  COMTEK  Services  is  preparing  a new release of this
     product  (version  3.5)  which will contain a fix for this problem.
     This  new  release  is  scheduled to be available in February 2002.
     Contact COMTEK Services for further information.

     NMServer  for VOS has not as yet been tested; vulnerability of this
     agent  is  unknown.  Contact for further information on the testing
     schedule of the VOS product.

Covalent Technologies

     Covalent Technologies ERS (Enterprise Ready Server), Secure Server,
     and  Conductor  SNMP module are not vulnerable according to testing
     performed   in   accordance  with  CERT  recommendations.  Security
     information for Covalent products can be found at www.covalent.net

Dartware, LLC

     Dartware,  LLC  (www.dartware.com)  supplies  two products that use
     SNMPv1  in  a  manager  role,  InterMapper  and SNMP Watcher. These
     products  are not vulnerable to the SNMP vulnerability described in
     [VU#854306  and  VU#107186].  This statement applies to all present
     and past versions of these two software packages.

DMH Software

     DMH  Software  is  in  the  process of evaluating and attempting to
     reproduce this behavior.
     It  is  unclear at this point if our snmp-agent is sensitive to the
     tests described above.
     If  any  problems  will  be  discovered,  DMH  Software will code a
     software fix.
     The  release of DMH Software OS correcting the behavior outlined in
     VU#854306, VU#107186, and OUSPG#0100 will be generally available to
     all of DMH Software's customers as soon as possible.

EnGarde Secure Linux

     EnGarde  Secure  Linux  did  not  ship any SNMP packages in version
     1.0.1 of our distribution, so we are not vulnerable to either bug.

FreeBSD

     FreeBSD  does  not  include any SNMP software by default, and so is
     not vulnerable.  However, the FreeBSD Ports Collection contains the
     UCD-SNMP   /   NET-SNMP   package.    Package   versions  prior  to
     ucd-snmp-4.2.3  are  vulnerable.   The upcoming FreeBSD 4.5 release
     will  ship  the  corrected  version  of  the  UCD-SNMP  /  NET-SNMP
     package.   In  addition,  the  corrected version of the packages is
     available from the FreeBSD mirrors.

     FreeBSD   has   issued  the  following  FreeBSD  Security  Advisory
     regarding the UCD-SNMP / NET-SNMP package:
     ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:09.
     snmp.asc.

Hewlett-Packard Company

     SUMMARY - known vulnerable:

hp procurve switch 2524 NNM (Network Node Manager) JetDirect Firmware (Older versions only) HP-UX Systems running snmpd or OPENVIEW MC/ServiceGuard EMS Still under investigation: SNMP/iX (MPE/iX)
_________________________________________________________ --------------------------------------------------------- hp procurve switch 2524 --------------------------------------------------------- hp procurve switch 2525 (product J4813A) is vulnerable to some issues, patches in process. Watch for the associated HP Security Bulletin. --------------------------------------------------------- NNM (Network Node Manager) --------------------------------------------------------- Some problems were found in NNM product were related to trap handling. Patches in process. Watch for the associated HP Security Bulletin. --------------------------------------------------------- JetDirect Firmware (Older versions only) --------------------------------------------------------- ONLY some older versions of JetDirect Firmware are vulnerable to some of the issues. The older firmware can be upgraded in most cases, see list below. JetDirect Firmware Version State
X.08.32 and higher NOT Vulnerable X.21.00 and higher NOT Vulnerable JetDirect Product Numbers that can be freely upgraded to X.08.32 or X.21.00 or higher firmware. EIO (Peripherals Laserjet 4000, 5000, 8000, etc...) J3110A 10T J3111A 10T/10B2/LocalTalk J3112A Token Ring (discontinued) J3113A 10/100 (discontinued) J4169A 10/100 J4167A Token Ring MIO (Peripherals LaserJet 4, 4si, 5si, etc...) J2550A/B 10T (discontinued) J2552A/B 10T/10Base2/LocalTalk (discontinued) J2555A/B Token Ring (discontinued) J4100A 10/100 J4105A Token Ring J4106A 10T External Print Servers J2591A EX+ (discontinued) J2593A EX+3 10T/10B2 (discontinued) J2594A EX+3 Token Ring (discontinued) J3263A 300X 10/100 J3264A 500X Token Ring J3265A 500X 10/100 ---------------------------------------------------------- HP-UX Systems running snmpd or OPENVIEW ---------------------------------------------------------- The following patches are available now: PHSS_26137 s700_800 10.20 OV EMANATE14.2 Agent Consolidated Patch PHSS_26138 s700_800 11.X OV EMANATE14.2 Agent Consolidated Patch PSOV_03087 EMANATE Release 14.2 Solaris 2.X Agent Consolidated Patch All three patches are available from: http://support.openview.hp.com/cpe/patches/ In addition PHSS_26137 and PHSS_26138 will soon be available from: http://itrc.hp.com
NOTE: The patches are labeled OV(Open View). However, the patches are also applicable to systems that are not running Open View.
Any HP-UX 10.X or 11.X system running snmpd or snmpdm is vulnerable. To determine if your HP-UX system has snmpd or snmpdm installed: swlist -l file | grep snmpd If a patch is not available for your platform or you cannot install an available patch, snmpd and snmpdm can be disabled by removing their entries from /etc/services and removing the execute permissions from /usr/sbin/snmpd and /usr/sbin/snmpdm. ---------------------------------------------------------------- Investigation completed, systems vulnerable. ---------------------------------------------------------------- MC/ServiceGuard Event Monitoring System (EMS) ---------------------------------------------------------------- Still under investigation: ---------------------------------------------------------------- SNMP/iX (MPE/iX) Hirschmann Electronics GmbH & Co. KG Hirschmann Electronics GmbH & Co. KG supplies a broad range of networking products, some of which are affected by the SNMP vulnerabilities identified by CERT Coordination Center. The manner in which they are affected and the actions required to avoid being impacted by exploitation of these vulnerabilities, vary from product to product. Hirschmann customers may contact our Competence Center (phone +49-7127-14-1538, email: [email protected]) for additional information, especially regarding availability of latest firmware releases addressing the SNMP vulnerabilities. IBM Corporation Based upon the results of running the test suites we have determined that our version of SNMP shipped with AIX is NOT vulnerable. Innerdive Solutions, LLC Innerdive Solutions, LLC has two SNMP based products: 1. The "SNMP MIB Scout" (http://www.innerdive.com/products/mibscout/) 2. The "Router IP Console" (http://www.innerdive.com/products/ric/) The "SNMP MIB Scout" is not vulnerable to either bug. The "Router IP Console" releases prior to 3.3.0.407 are vulnerable. The release of "Router IP Console" correcting the behavior outlined in OUSPG#0100 is 3.3.0.407 and is already available on our site. Also, we will notify all our customers about this new release no later than March 5, 2002. Juniper Networks This is in reference to your notification regarding CAN-2002-0012 and CAN-2002-0013. Juniper Networks has reproduced this behavior and coded a software fix. The fix will be included in all releases of JUNOS Internet software built after January 5, 2002. Customers with current support contracts can download new software with the fix from Juniper's web site at www.juniper.net. Note: The behavior described in CAN-2002-0012 and CAN-2002-0013 can only be reproduced in JUNOS Internet software if certain tracing options are enabled. These options are generally not enabled in production routers. Lantronix, Inc. Lantronix is committed to resolving security issues with our products. The SNMP security bug you reported has been fixed in LRS firmware version B1.3/611(020123). Lotus Development Corporation Lotus Software evaluated the Lotus Domino Server for vulnerabilities using the test suite materials provided by OUSPG. This problem does not affect default installations of the Domino Server. However, SNMP agents can be installed from the CD to provide SNMP services for the Domino Server (these are located in the /apps/sysmgmt/agents directory). The optional platform specific master and encapsulator agents included with the Lotus Domino SNMP Agents for HP-UX and Solaris have been found to be vulnerable. For those platforms, customers should upgrade to version R5.0.1 a of the Lotus Domino SNMP Agents, available for download from the Lotus Knowledge Base on the IBM Support Web Site (http://www.ibm.com/software/lotus/support/). Please refer to Document #191059, "Lotus Domino SNMP Agents R5.0.1a", also in the Lotus Knowledge Base, for more details. LOGEC Systems Inc The products from LOGEC Systems are exposed to SNMP only via HP OpenView. We do not have an implementation of SNMP ourselves. As such, there is nothing in our products that would be an issue with this alert. Lucent Lucent is aware of reports that there is a vulnerability in certain implementations of the SNMP (Simple Network Management Protocol) code that is used in data switches and other hardware throughout the telecom industry. As soon as we were notified by CERT, we began assessing our product portfolio and notifying customers with products that might be affected. Our 5ESS switch and most of our optical portfolio were not affected. Our core and edge ATM switches and most of our edge access products are affected, but we have developed, tested, and deployed fixes for many of those products to our customers. Fixes for the rest of the affected product portfolio will be available shortly. We consider the security and reliability of our customers' networks to be one of our critical measures of success. We take every reasonable measure to ensure their satisfaction. In addition, we are working with customers on ways to further enhance the security they have in place today. Marconi Marconi supplies a broad range of telecommunications and related products, some of which are affected by the SNMP vulnerabilities identified here. The manner in which they are affected and the actions required (if any) to avoid being impacted by exploitation of these vulnerabilities, vary from product to product. Those Marconi customers with support entitlement may contact the appropriate Technical Assistance Center (TAC) for additional information. Those not under support entitlement may contact their sales representative. Microsoft Corporation The Microsoft Security Reponse [sic] Center has investigated this issue, and provides the following information. Summary: All Microsoft implementations of SNMP v1 are affected by the vulnerability. The SNMP v1 service is not installed or running by default on any version of Windows. A patch is underway to eliminate the vulnerability. In the meantime, we recommend that affected customers disable the SNMP v1 service. Details: An SNMP v1 service ships on the CDs for Windows 95, 98, and 98SE. It is not installed or running by default on any of these platforms. An SNMP v1 is NOT provided for Windows ME. However, it is possible that Windows 98 machines which had the service installed and were upgraded would still have the service. Since SNMP is not supported for WinME, customers in this situation are urged to remove the SNMP service. An SNMP v1 service is available on Windows NT 4.0 (including Terminal Server Edition) and Windows 2000 but is not installed or running by default on any of these platforms.Windows XP does not ship with an SNMP v1 service. Remediation: A patch is underway for the affected platforms, and will be released shortly. In the meantime, Microsoft recommends that customers who have the SNMP v1 service running disable it to protect their systems. Following are instruction for doing this: Windows 95, 98 and 98SE: 1. In Control Panel, double-click Network. 2. On the Configuration tab, select Microsoft SNMP Agent from the list of installed components. 3. Click Remove Check the following keys and confirm that snmp.exe is not listed. HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunSer vices HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run For Windows XP: 1. Right-click on My Computer and select Manage 2. Click on Services and Applications, then on Services 3. Location SNMP on the list of services, then select it and click Stop. 4. Select Startup, and click Disabled. 5. Click OK to close the dialoge [sic], then close the Computer Management window. For Windows NT 4.0 (including Terminal Server Edition): 1. Select Start, then Settings. 2. Select Control Panel, then click on the Services Icon 3. Locate SNMP on the list of services, then select it and click Stop. 4. Select Startup, and click Disabled. 5. Click OK to close the dialoge [sic], then close Control Panel Windows 2000: 1. Right-click on My Computer and select Manage 2. Click on Services and Applications, then on Services 3. Location SNMP on the list of services, then select it and click Stop. 4. Select Startup, and click Disabled. 5. Click OK to close the dialoge [sic], then close the Computer Management window. Multinet MultiNet and TCPware customers should contact Process Software to check for the availability of patches for this issue. A couple of minor problems were found and fixed, but there is no security risk related to the SNMP code included with either product. Netaphor NETAPHOR SOFTWARE INC. is the creator of Cyberons for Java -- SNMP Manager Toolkit and Cyberons for Java -- NMS Application Toolkit, two Java based products that may be affected by the SNMP vulnerabilities identified here. The manner in which they are affected and the actions required (if any) to avoid being impacted by exploitation of these vulnerabilities, may be obtained by contacting Netaphor via email at [email protected] Customers with annual support may contact [email protected] directly. Those not under support entitlement may contact Netaphor sales: [email protected] or (949) 470 7955 in USA. NetBSD NetBSD does not ship with any SNMP tools in our 'base' releases. We do provide optional packages which provide various support for SNMP. These packages are not installed by default, nor are they currently provided as an install option by the operating system installation tools. A system administrator/end-user has to manually install this with our package management tools. These SNMP packages include: + netsaint-plugin-snmp-1.2.8.4 (SNMP monitoring plug-in for netsaint) + p5-Net-SNMP-3.60 (perl5 module for SNMP queries) + p5-SNMP-3.1.0 (Perl5 module for interfacing to the UCD SNMP library + p5-SNMP_Session-0.83 (perl5 module providing rudimentary access to remote SNMP agents) + ucd-snmp-4.2.1 (Extensible SNMP implementation) (conflicts with ucd-snmp-4.1.2) + ucd-snmp-4.1.2 (Extensible SNMP implementation) (conflicts with ucd-snmp-4.2.1) We do provide a software monitoring mechanism called 'audit-packages', which allows us to highlight if a package with a range of versions has a potential vulnerability, and recommends that the end-user upgrade the packages in question. Netscape Communications Corporation Netscape continues to be committed to maintaining a high level of quality in our software and service offerings. Part of this commitment includes prompt response to security issues discovered by organizations such as the CERT Coordination Center. According to a recent CERT/CC advisory, The Oulu University Secure Programming Group (OUSPG) has reported numerous vulnerabilities in multiple vendor SNMPv1 implementations. These vulnerabilities may allow unauthorized privileged access, denial of service attacks, or unstable behavior. We have carefully examined the reported findings, performing the tests suggested by the OUSPG to determine whether Netscape server products were subject to these vulnerabilities. It was determined that several products fell into this category. As a result, we have created fixes which will resolve the issues, and these fixes will appear in future releases of our product line. To Netscape's knowledge, there are no known instances of these vulnerabilities being exploited and no customers have been affected to date. When such security warnings are issued, Netscape has committed to - and will continue to commit to - resolving these issues in a prompt and timely fashion, ensuring that our customers receive products of the highest quality and security. NET-SNMP All ucd-snmp version prior to 4.2.2 are susceptible to this vulnerability and users of versions prior to version 4.2.2 are encouraged to upgrade their software as soon as possible (http://www.net-snmp.org/download/). Version 4.2.2 and higher are not susceptible. Network Associates PGP is not affected, impacted, or otherwise related to this VU#. Network Computing Technologies Network Computing Technologies has reviewed the information regarding SNMP vulnerabilities and is currently investigating the impact to our products. Nokia This vulnerability is known to affect IPSO versions 3.1.3, 3.3, 3.3.1, 3.4, and 3.4.1. Patches are currently available for versions 3.3, 3.3.1, 3.4 and 3.4.1 for download from the Nokia website. In addition, version 3.4.2 shipped with the patch incorporated, and the necessary fix will be included in all future releases of IPSO. We recommend customers install the patch immediately or follow the recommended precautions below to avoid any potential exploit. If you are not using SNMP services, including Traps, simply disable the SNMP daemon to completely eliminate the potential vulnerability. If you are using only SNMP Traps and running Check Point FireWall-1, create a firewall policy to disallow incoming SNMP messages on all appropriate interfaces. Traps will continue to work normally. Nortel Networks The CERT Coordination Center has issued a broad based alert to the technology industry, including Nortel Networks, regarding potential security vulnerabilities identified in the Simple Network Management Protocol (SNMP), a common networking standard. The company is working with CERT and other network equipment manufacturers, the U.S. Government, service providers, and software suppliers to assess and address this issue. Novell Novell ships SNMP.NLM and SNMPLOG.NLM with NetWare 4.x, NetWare 5.x and 6.0 systems. The SNMP and SNMPLOG vulnerabilities detected on NetWare are fixed and will be available through NetWare 6 Support Pack 1 & NetWare 5.1 Support Pack 4. Support packs are available at http://support.novell.com/tools/csp/ OpenBSD OpenBSD does not ship SNMP code. Qualcomm WorldMail does not support SNMP by default, so customers who run unmodified installations are not vulnerable. Redback Networks, Inc. Redback Networks, Inc. has identified that the vulnerability in question affects certain versions of AOS software on the SMS 500, SMS 1800, and SMS 10000 platforms, and is taking the appropriate steps necessary to correct the issue. Red Hat RedHat has released a security advisiory [sic] at http://www.redhat.com/support/errata/RHSA-2001-163.html with updated versions of the ucd-snmp package for all supported releases and architectures. For more information or to download the update please visit this page. SGI SGI acknowledges the SNMP vulnerabilities reported by CERT and is currently investigating. No further information is available at this time. For the protection of all our customers, SGI does not disclose, discuss or confirm vulnerabilities until a full investigation has occurred and any necessary patch(es) or release streams are available for all vulnerable and supported IRIX operating systems. Until SGI has more definitive information to provide, customers are encouraged to assume all security vulnerabilities as exploitable and take appropriate steps according to local site security policies and requirements. As further information becomes available, additional advisories will be issued via the normal SGI security information distribution methods including the wiretap mailing list on http://www.sgi.com/support/security/. SNMP Research International SNMP Research has made the following vendor statement. They are likely to revise and expand the statement as the date for the public vulnerability announcement draws nearer. The most recent releases (15.3.1.7 and above) of all SNMP Research products address the vulnerabilities identified in the following CERT vulnerability advisories: VU#854306 (Multiple vulnerabilities in SNMPv1 request handling) VU#107186 (Multiple vulnerabilities in SNMPv1 trap handling) All customers who maintain a support contract have received either this release or appropriate patch sets to their 15.3 source code releases addressing these vulnerabilities. Users maintaining earlier releases should update to the current release if they have not already done so. Up-to-date information is available from [email protected]. Stonesoft Stonesoft's StoneGate product does not include an SNMP agent, and is therefore not vulnerable to this. Other Stonesoft's products are still under investigation. As further information becomes available, additional advisories will be available at http://www.stonesoft.com/support/techcenter/ Sun Microsystems, Inc. Sun's SNMP product, Solstice Enterprise Agents (SEA), described here: http://www.sun.com/solstice/products/ent.agents/ is affected by VU#854306 but not VU#107186. More specifically the main agent of SEA, snmpdx(1M), is affected on Solaris 2.6, 7, 8. Sun is currently generating patches for this issue and will be releasing a Sun Security Bulletin once the patches are available. The bulletin will be available from: http://sunsolve.sun.com/security. Sun patches are available from: http://sunsolve.sun.com/securitypatch. Symantec Corporation Symantec Corporation has investigated the SNMP issues identified by the OUSPG test suite and determined that Symantec products are not susceptable [sic] to these issues. TANDBERG Tandberg have run all the testcases found the PROTOS test-suie [sic], c06snmpv1: 1. c06-snmpv1-trap-enc-pr1.jar 2. c06-snmpv1-treq-app-pr1.jar 3. c06-snmpv1-trap-enc-pr1.jar 4. c06-snmpv1-req-app-pr1.jar The tests were run with standard delay time between the requests (100ms), but also with a delay of 1ms. The tests applies to all TANDBERG products (T500, T880, T1000, T2500, T6000 and T8000). The software tested on these products were B4.0 (our latest software) and no problems were found when running the test suite. Tivoli Systems Our analysis indicates that this vulnerability does not affect the Tivoli NetView product. Appendix B. - References 1. http://www.ee.oulu.fi/research/ouspg/protos/ 2. http://www.kb.cert.org/vuls/id/854306 3. http://www.kb.cert.org/vuls/id/107186 4. http://www.cert.org/tech_tips/denial_of_service.html 5. http://www.ietf.org/rfc/rfc1067.txt 6. http://www.ietf.org/rfc/rfc1089.txt 7. http://www.ietf.org/rfc/rfc1140.txt 8. http://www.ietf.org/rfc/rfc1155.txt 9. http://www.ietf.org/rfc/rfc1156.txt 10. http://www.ietf.org/rfc/rfc1215.txt 11. http://www.ietf.org/rfc/rfc1270.txt 12. http://www.ietf.org/rfc/rfc1352.txt Appendix C. - Background Information Background Information on the OUSPG OUSPG is an academic research group located at Oulu University in Finland. The purpose of this research group is to test software for vulnerabilities. History has shown that the techniques used by the OUSPG have discovered a large number of previously undetected problems in the products and protocols they have tested. In 2001, the OUSPG produced a comprehensive test suite for evaluating implementations of the Lightweight Directory Access Protocol (LDAP). This test suite was developed with the strategy of abusing the protocol in unsupported and unexpected ways, and it was very effective in uncovering a wide variety of vulnerabilities across several products. This approach can reveal vulnerabilities that would not manifest themselves under normal conditions. After completing its work on LDAP, OUSPG moved its focus to SNMPv1. As with LDAP, they designed a custom test suite, began testing a selection of products, and found a number of vulnerabilities. Because OUSPG's work on LDAP was similar in procedure to its current work on SNMP, you may wish to review the LDAP Test Suite and CERT Advisory CA-2001-18, which outlined results of application of the test suite. In order to test the security of protocols like SNMPv1, the PROTOS project presents a server with a wide variety of sample packets containing unexpected values or illegally formatted data. As a member of the PROTOS project consortium, the OUSPG used the PROTOS c06-snmpv1 test suite to study several implementations of the SNMPv1 protocol. Results of the test suites run against SNMP indicate that there are many different vulnerabilities on many different implementations of SNMP. Background Information on the Simple Network Management Protocol The Simple Network Management Protocol (SNMP) is the most popular protocol in use to manage networked devices. SNMP was designed in the late 80's to facilitate the exchange of management information between networked devices, operating at the application layer of the ISO/OSI model. The SNMP protocol enables network and system administrators to remotely monitor and configure devices on the network (devices such as switches and routers). Software and firmware products designed for networks often make use of the SNMP protocol. SNMP runs on a multitude of devices and operating systems, including, but not limited to, + Core Network Devices (Routers, Switches, Hubs, Bridges, and Wireless Network Access Points) + Operating Systems + Consumer Broadband Network Devices (Cable Modems and DSL Modems) + Consumer Electronic Devices (Cameras and Image Scanners) + Networked Office Equipment (Printers, Copiers, and FAX Machines) + Network and Systems Management/Diagnostic Frameworks (Network Sniffers and Network Analyzers) + Uninterruptible Power Supplies (UPS) + Networked Medical Equipment (Imaging Units and Oscilloscopes) + Manufacturing and Processing Equipment The SNMP protocol is formally defined in RFC1157. Quoting from that RFC: Implicit in the SNMP architectural model is a collection of network management stations and network elements. Network management stations execute management applications which monitor and control network elements. Network elements are devices such as hosts, gateways, terminal servers, and the like, which have management agents responsible for performing the network management functions requested by the network management stations. The Simple Network Management Protocol (SNMP) is used to communicate management information between the network management stations and the agents in the network elements. Additionally, SNMP is discussed in a number of other RFC documents: + RFC 3000 Internet Official Protocol Standards + RFC 1212 Concise MIB Definitions + RFC 1213 Management Information Base for Network Management of TCP/IP-based Internets: MIB-II + RFC 1215 A Convention for Defining Traps for use with the SNMP + RFC 1270 SNMP Communications Services + RFC 2570 Introduction to Version 3 of the Internet-standard Network Management Framework + RFC 2571 An Architecture for Describing SNMP Management Frameworks + RFC 2572 Message Processing and Dispatching for the Simple Network Management Protocol (SNMP) + RFC 2573 SNMP Applications + RFC 2574 User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3) + RFC 2575 View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP) + RFC 2576 Coexistence between Version 1, Version 2, and Version 3 of the Internet-standard Network Management Framework _____________________________________________________________ The CERT Coordination Center thanks the Oulu University Secure Programming Group for reporting these vulnerabilities to us, for providing detailed technical analyses, and for assisting us in preparing this advisory. We also thank Steven M. Bellovin (AT&T Labs -- Research), Wes Hardaker (Net-SNMP), Steve Moulton (SNMP Research), Tom Reddington (Bell Labs), Mike Duckett (Bell South), Rob Thomas, Blue Boar (Thievco), and the many others who contributed to this document. _____________________________________________________________ Feedback on this document can be directed to the authors, Ian A. Finlay, Shawn V. Hernan, Jason A. Rafail, Chad Dougherty, Allen D. Householder, Marty Lindner, and Art Manion. __________________________________________________________________ This document is available from: http://www.cert.org/advisories/CA-2002-03.html __________________________________________________________________ CERT/CC Contact Information Email: [email protected] Phone: +1 412-268-7090 (24-hour hotline) Fax: +1 412-268-6989 Postal address: CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh PA 15213-3890 U.S.A. CERT/CC personnel answer the hotline 08:00-17:00 EST(GMT-5) / EDT(GMT-4) Monday through Friday; they are on call for emergencies during other hours, on U.S. holidays, and on weekends. Using encryption We strongly urge you to encrypt sensitive information sent by email. Our public PGP key is available from http://www.cert.org/CERT_PGP.key If you prefer to use DES, please call the CERT hotline for more information. Getting security information CERT publications and other security information are available from our web site http://www.cert.org/ To subscribe to the CERT mailing list for advisories and bulletins, send email to [email protected]. Please include in the body of your message subscribe cert-advisory * "CERT" and "CERT Coordination Center" are registered in the U.S. Patent and Trademark Office. __________________________________________________________________ NO WARRANTY Any material furnished by Carnegie Mellon University and the Software Engineering Institute is furnished on an "as is" basis. Carnegie Mellon University makes no warranties of any kind, either expressed or implied as to any matter including, but not limited to, warranty of fitness for a particular purpose or merchantability, exclusivity or results obtained from use of the material. Carnegie Mellon University does not make any warranty of any kind with respect to freedom from patent, trademark, or copyright infringement. _____________________________________________________________ Conditions for use, disclaimers, and sponsorship information Copyright 2002 Carnegie Mellon University. Revision History February 12, 2002: Initial release -----BEGIN PGP SIGNATURE----- Version: PGP 6.5.8 iQCVAwUBPGltxKCVPMXQI2HJAQGVeAQAuHtxGBsmU5HI6PtqhpZ1rkpV+Cq3ChIU R1FUz4Zi2vzklH8jdXd10KqwZAPhXTPazeguhRyLVSUprMlSKqcXg3BCkH/y4WAl QUZ1VnQXMnMrxIJO1fv0WW0pcyM4W0iQBl0kCIlawPcjCGVniOCOr+4CE0f923wr uZiMJ5f2SEo= =h42e -----END PGP SIGNATURE-----

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру