[nsp-sec] Cisco Security Advisory: SNMP Version 3 Authentication Vulnerabilities

Eli Dart dart at es.net
Tue Jun 10 19:26:10 EDT 2008


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


[snip]

> Multiple Cisco products contain either of two authentication
> vulnerabilities in the Simple Network Management Protocol version 3
> (SNMPv3) feature. These vulnerabilities can be exploited when
> processing a malformed SNMPv3 message. These vulnerabilities could
> allow the disclosure of network information or may enable an attacker
> to perform configuration changes to vulnerable devices. The SNMP
> server is an optional service that is disabled by default in Cisco
> products. Only SNMPv3 is impacted by these vulnerabilities.
            ^^^^^^^^^^^^^^^^^^^^^^^^

Does this mean that only SNMPv3 packets can exploit the vulnerability,
or that the router must be configured for SNMPv3 in order to be vulnerable?

For example, changing to a different version of SNMP is not listed in
the workarounds section.


		--eli

- --
Eli Dart                                         Office: (510) 486-5629
ESnet Network Engineering Group                  Fax:    (510) 486-6712
Lawrence Berkeley National Laboratory
PGP Key fingerprint = C970 F8D3 CFDD 8FFF 5486 343A 2D31 4478 5F82 B2B3

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (FreeBSD)

iEYEARECAAYFAkhPDZIACgkQLTFEeF+CsrPjNgCgxyL8Ylw6BbogHLBg359t3SZX
yDgAn14tHx7X+H7jpSp9t0UcSbu6jUgx
=x9vL
-----END PGP SIGNATURE-----



More information about the nsp-security mailing list