[nsp-sec] Cisco Security Advisory: SNMP Version 3 Authentication Vulnerabilities
Eli Dart
dart at es.net
Tue Jun 10 19:26:10 EDT 2008
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
[snip]
> Multiple Cisco products contain either of two authentication
> vulnerabilities in the Simple Network Management Protocol version 3
> (SNMPv3) feature. These vulnerabilities can be exploited when
> processing a malformed SNMPv3 message. These vulnerabilities could
> allow the disclosure of network information or may enable an attacker
> to perform configuration changes to vulnerable devices. The SNMP
> server is an optional service that is disabled by default in Cisco
> products. Only SNMPv3 is impacted by these vulnerabilities.
^^^^^^^^^^^^^^^^^^^^^^^^
Does this mean that only SNMPv3 packets can exploit the vulnerability,
or that the router must be configured for SNMPv3 in order to be vulnerable?
For example, changing to a different version of SNMP is not listed in
the workarounds section.
--eli
- --
Eli Dart Office: (510) 486-5629
ESnet Network Engineering Group Fax: (510) 486-6712
Lawrence Berkeley National Laboratory
PGP Key fingerprint = C970 F8D3 CFDD 8FFF 5486 343A 2D31 4478 5F82 B2B3
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (FreeBSD)
iEYEARECAAYFAkhPDZIACgkQLTFEeF+CsrPjNgCgxyL8Ylw6BbogHLBg359t3SZX
yDgAn14tHx7X+H7jpSp9t0UcSbu6jUgx
=x9vL
-----END PGP SIGNATURE-----
More information about the nsp-security
mailing list