Quoting Michal Zalewski ([EMAIL PROTECTED]):
> On Tue, 15 Feb 2000, harikiri wrote:
>
> > It appears that on the above releases of AIX, the SNMP daemon is
> > enabled by default and two community names are enabled with read/write
> > privileges. The community names are "private" and "system", but are
> > only allowed from localhost connections. Nevertheless, a local user
> > may install an SNMP client, and modify sensitive variables.
>
> SNMP requests with no authentication except for source-IP comparsion, are
> spoofable.
>

All recent versions of AIX discard packets with a source address of
loopback when the packet comes in on an external interface.  The
following APARs have been available for over 2 years:

   Abstract:   SECURITY: discard loopback packets on external interfaces
   4.1.x APAR: IX71366
   4.2.x APAR: IX71405
   4.3.x APAR: included in 4.3.0 initial release

--
Troy Bollinger                            [EMAIL PROTECTED]
AIX Security Development        [EMAIL PROTECTED]
PGP keyid: 1024/0xB7783129 Troy's opinions are not IBM policy

Reply via email to