[nsp-sec] Juniper Networks advisory re SNMPv3
Paul Goyette
pgoyette at juniper.net
Tue Jun 10 16:30:12 EDT 2008
I didn't actually build it, I just invoked the standard
"build everything" script! (And in the future, I'll be
changing my name to 'jtac-builder' to avoid confusion
and liability :) !)
All of our released software uses the Epilogue SNMP
library. We've switching to net-snmp in 9.2 IIRC.
Paul Goyette
Juniper Networks Customer Service
JTAC Senior Escalation Engineer
Juniper Security Incident Response Team
PGP Key ID 0x53BA7731 Fingerprint:
FA29 0E3B 35AF E8AE 6651
0786 F758 55DE 53BA 7731
> -----Original Message-----
> From: Smith, Donald [mailto:Donald.Smith at qwest.com]
> Sent: Tuesday, June 10, 2008 12:56 PM
> To: Paul Goyette; nsp-security at puck.nether.net
> Subject: RE: [nsp-sec] Juniper Networks advisory re SNMPv3
>
> Which snmpd does JUNOS use?
> The reason I ask is net-snmp is often included with various flavors of
> BSD.
>
> The reason I ask you is you appear to have built it;)
> SNMPD release 7.4I0 built by pgoyette on 2007-12-13 04:57:17 UTC
>
>
>
> Security through obscurity WORKS against some worms and ssh attacks:)
> Donald.Smith at qwest.com giac
>
> > -----Original Message-----
> > From: nsp-security-bounces at puck.nether.net
> > [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of
> > Paul Goyette
> > Sent: Tuesday, June 10, 2008 12:23 PM
> > To: nsp-security at puck.nether.net
> > Subject: [nsp-sec] Juniper Networks advisory re SNMPv3
> >
> > ----------- nsp-security Confidential --------
> >
> > Looks like Juniper got lucky this time. Only one of our
> > products is affected, and it's probably not widely used
> > in the Service Provider space...
> >
> > PSN-2008-06-005
> > Title: Authentication vulnerability in some
> > implementations of SNMPv3 (CERT/CC
> > VU#878044)
> > Products Affected: C-series Session and Resource Control
> > appliances
> > Platforms Affected: SRC Software
> >
> > Issue
> > -----
> > Certain implementations of SNMPv3 have a minor deficiency
> > in the way HMAC authentication is performed. This can lead
> > to isolated cases of spoofed SNMPv3 authentication.
> >
> > This issue is tracked in TIC.14989 and TIC.14990 for the
> > C-series Session and Resource Control appliances running
> > SRC. US-CERT has assigned VU#878044 to track this
> > vulnerability.
> >
> > No other Juniper Networks products are affected by this
> > vulnerability.
> >
> > Solution
> > --------
> > The code has been modified to properly perform HMAC
> > authentication. These modifications eliminate this method
> > of being erroneously authenticated to the device.
> >
> > Solution Implementation
> > -----------------------
> > Customers running SRC 1.0.0, 1.0.1, or 2.0.0 should contact
> > Juniper Networks Customer Support to obtain updated versions
> > of the software for the C-series platform. Customers
> > utilizing a C-series Session and Resource Control appliance
> > should upgrade their software to a release dated after June
> > 13, 2008.
> >
> > Workarounds
> > -----------
> > There are several mitigation techniques available to avoid
> > this authentication vulnerability:
> >
> > * Disable SNMPv3 on the affected device.
> > * Restrict access to SNMPv3 via access lists.
> >
> > Disclaimer
> > ----------
> > Juniper Networks is providing this notice on an "AS IS" basis.
> > No warranty or guarantee of any kind is expressed in this
> > notice and none should be implied. Juniper Networks expressly
> > excludes and disclaims any warranties regarding this notice or
> > materials referred to in this notice, including, without
> > limitation, any implied warranty of merchantability, fitness
> > for a particular purpose, absence of hidden defects, or of
> > noninfringement. Your use or reliance on this notice or
> > materials referred to in this notice is at your own risk.
> > Juniper Networks may change this notice at any time.
> >
> >
> > Paul Goyette
> > Juniper Networks Customer Service
> > JTAC Senior Escalation Engineer
> > Juniper Security Incident Response Team
> > PGP Key ID 0x53BA7731 Fingerprint:
> > FA29 0E3B 35AF E8AE 6651
> > 0786 F758 55DE 53BA 7731
> >
> >
> > _______________________________________________
> > nsp-security mailing list
> > nsp-security at puck.nether.net
> > https://puck.nether.net/mailman/listinfo/nsp-security
> >
> > Please do not Forward, CC, or BCC this E-mail outside of the
> > nsp-security
> > community. Confidentiality is essential for effective
> > Internet security counter-measures.
> > _______________________________________________
> >
> >
>
>
> This communication is the property of Qwest and may contain
> confidential or
> privileged information. Unauthorized use of this
> communication is strictly
> prohibited and may be unlawful. If you have received this
> communication
> in error, please immediately notify the sender by reply
> e-mail and destroy
> all copies of the communication and any attachments.
>
More information about the nsp-security
mailing list