[nsp-sec] Juniper Networks advisory re SNMPv3
Paul Goyette
pgoyette at juniper.net
Tue Jun 10 14:22:38 EDT 2008
Looks like Juniper got lucky this time. Only one of our
products is affected, and it's probably not widely used
in the Service Provider space...
PSN-2008-06-005
Title: Authentication vulnerability in some
implementations of SNMPv3 (CERT/CC
VU#878044)
Products Affected: C-series Session and Resource Control
appliances
Platforms Affected: SRC Software
Issue
-----
Certain implementations of SNMPv3 have a minor deficiency
in the way HMAC authentication is performed. This can lead
to isolated cases of spoofed SNMPv3 authentication.
This issue is tracked in TIC.14989 and TIC.14990 for the
C-series Session and Resource Control appliances running
SRC. US-CERT has assigned VU#878044 to track this
vulnerability.
No other Juniper Networks products are affected by this
vulnerability.
Solution
--------
The code has been modified to properly perform HMAC
authentication. These modifications eliminate this method
of being erroneously authenticated to the device.
Solution Implementation
-----------------------
Customers running SRC 1.0.0, 1.0.1, or 2.0.0 should contact
Juniper Networks Customer Support to obtain updated versions
of the software for the C-series platform. Customers
utilizing a C-series Session and Resource Control appliance
should upgrade their software to a release dated after June
13, 2008.
Workarounds
-----------
There are several mitigation techniques available to avoid
this authentication vulnerability:
* Disable SNMPv3 on the affected device.
* Restrict access to SNMPv3 via access lists.
Disclaimer
----------
Juniper Networks is providing this notice on an "AS IS" basis.
No warranty or guarantee of any kind is expressed in this
notice and none should be implied. Juniper Networks expressly
excludes and disclaims any warranties regarding this notice or
materials referred to in this notice, including, without
limitation, any implied warranty of merchantability, fitness
for a particular purpose, absence of hidden defects, or of
noninfringement. Your use or reliance on this notice or
materials referred to in this notice is at your own risk.
Juniper Networks may change this notice at any time.
Paul Goyette
Juniper Networks Customer Service
JTAC Senior Escalation Engineer
Juniper Security Incident Response Team
PGP Key ID 0x53BA7731 Fingerprint:
FA29 0E3B 35AF E8AE 6651
0786 F758 55DE 53BA 7731
More information about the nsp-security
mailing list