[nsp-sec] Juniper Networks advisory re SNMPv3

Smith, Donald Donald.Smith at qwest.com
Tue Jun 10 16:34:02 EDT 2008


Thanks Paul that helps a lot!!
I know how your name got in there and REALLY do appreciate you building
those specials for us late last year!!


Security through obscurity WORKS against some worms and ssh attacks:)
Donald.Smith at qwest.com giac 

> -----Original Message-----
> From: Paul Goyette [mailto:pgoyette at juniper.net] 
> Sent: Tuesday, June 10, 2008 2:30 PM
> To: Smith, Donald; nsp-security at puck.nether.net
> Subject: RE: [nsp-sec] Juniper Networks advisory re SNMPv3
> 
> I didn't actually build it, I just invoked the standard
> "build everything" script!  (And in the future, I'll be
> changing my name to 'jtac-builder' to avoid confusion
> and liability :)  !)
> 
> All of our released software uses the Epilogue SNMP 
> library.  We've switching to net-snmp in 9.2 IIRC.
> 
> Paul Goyette
> Juniper Networks Customer Service
> JTAC Senior Escalation Engineer
> Juniper Security Incident Response Team
> PGP Key ID 0x53BA7731 Fingerprint:
>   FA29 0E3B 35AF E8AE 6651
>   0786 F758 55DE 53BA 7731 
> 
> > -----Original Message-----
> > From: Smith, Donald [mailto:Donald.Smith at qwest.com] 
> > Sent: Tuesday, June 10, 2008 12:56 PM
> > To: Paul Goyette; nsp-security at puck.nether.net
> > Subject: RE: [nsp-sec] Juniper Networks advisory re SNMPv3
> > 
> > Which snmpd does JUNOS use?
> > The reason I ask is net-snmp is often included with various 
> flavors of
> > BSD.
> > 
> > The reason I ask you is you appear to have built it;)
> > SNMPD release 7.4I0 built by pgoyette on 2007-12-13 04:57:17 UTC
> > 
> > 
> > 
> > Security through obscurity WORKS against some worms and ssh 
> attacks:)
> > Donald.Smith at qwest.com giac 
> > 
> > > -----Original Message-----
> > > From: nsp-security-bounces at puck.nether.net 
> > > [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of 
> > > Paul Goyette
> > > Sent: Tuesday, June 10, 2008 12:23 PM
> > > To: nsp-security at puck.nether.net
> > > Subject: [nsp-sec] Juniper Networks advisory re SNMPv3
> > > 
> > > ----------- nsp-security Confidential --------
> > > 
> > > Looks like Juniper got lucky this time.  Only one of our
> > > products is affected, and it's probably not widely used
> > > in the Service Provider space...
> > > 
> > > 	PSN-2008-06-005 
> > > 	Title:              Authentication vulnerability in some 
> > > 	                    implementations of SNMPv3 (CERT/CC 
> > > 	                    VU#878044) 
> > > 	Products Affected:  C-series Session and Resource Control 
> > > 	                    appliances 
> > > 	Platforms Affected: SRC Software 
> > >  
> > > 	Issue
> > > 	-----
> > > 	Certain implementations of SNMPv3 have a minor deficiency 
> > > 	in the way HMAC authentication is performed. This can lead 
> > > 	to isolated cases of spoofed SNMPv3 authentication. 
> > > 
> > > 	This issue is tracked in TIC.14989 and TIC.14990 for the
> > > 	C-series Session and Resource Control appliances running 
> > > 	SRC. US-CERT has assigned VU#878044 to track this 
> > > 	vulnerability. 
> > > 
> > > 	No other Juniper Networks products are affected by this 
> > > 	vulnerability. 
> > > 
> > > 	Solution
> > > 	--------
> > > 	The code has been modified to properly perform HMAC 
> > > 	authentication. These modifications eliminate this method 
> > > 	of being erroneously authenticated to the device. 
> > > 
> > > 	Solution Implementation
> > > 	-----------------------
> > > 	Customers running SRC 1.0.0, 1.0.1, or 2.0.0 should contact 
> > > 	Juniper Networks Customer Support to obtain updated versions 
> > > 	of the software for the C-series platform. Customers 
> > > 	utilizing a C-series Session and Resource Control appliance 
> > > 	should upgrade their software to a release dated after June 
> > > 	13, 2008. 
> > > 
> > > 	Workarounds
> > > 	-----------
> > > 	There are several mitigation techniques available to avoid 
> > > 	this authentication vulnerability: 
> > > 
> > > 	* Disable SNMPv3 on the affected device. 
> > > 	* Restrict access to SNMPv3 via access lists. 
> > > 
> > > 	Disclaimer
> > > 	----------
> > > 	Juniper Networks is providing this notice on an "AS IS" basis. 
> > > 	No warranty or guarantee of any kind is expressed in this 
> > > 	notice and none should be implied. Juniper Networks expressly 
> > > 	excludes and disclaims any warranties regarding this notice or 
> > > 	materials referred to in this notice, including, without 
> > > 	limitation, any implied warranty of merchantability, fitness 
> > > 	for a particular purpose, absence of hidden defects, or of 
> > > 	noninfringement. Your use or reliance on this notice or 
> > > 	materials referred to in this notice is at your own risk. 
> > > 	Juniper Networks may change this notice at any time. 
> > >  
> > > 
> > > Paul Goyette
> > > Juniper Networks Customer Service
> > > JTAC Senior Escalation Engineer
> > > Juniper Security Incident Response Team
> > > PGP Key ID 0x53BA7731 Fingerprint:
> > >   FA29 0E3B 35AF E8AE 6651
> > >   0786 F758 55DE 53BA 7731
> > > 
> > > 
> > > _______________________________________________
> > > nsp-security mailing list
> > > nsp-security at puck.nether.net
> > > https://puck.nether.net/mailman/listinfo/nsp-security
> > > 
> > > Please do not Forward, CC, or BCC this E-mail outside of the 
> > > nsp-security
> > > community. Confidentiality is essential for effective 
> > > Internet security counter-measures.
> > > _______________________________________________
> > > 
> > > 
> > 
> > 
> > This communication is the property of Qwest and may contain 
> > confidential or
> > privileged information. Unauthorized use of this 
> > communication is strictly 
> > prohibited and may be unlawful.  If you have received this 
> > communication 
> > in error, please immediately notify the sender by reply 
> > e-mail and destroy 
> > all copies of the communication and any attachments.
> > 
> 



More information about the nsp-security mailing list