I had an auditor have a similar finding on a device console (can't remember if 
it was HMC, Shark, or what). I sent it to the IBM support center. There 
response was that the box, OS, and applications comprised a proprietary piece 
of equipment that had little customer configuration capability. Any changes 
could invalidate warranty and service contract of the PC and the associated 
hardware (processor, DASD, etc.). If a proven security issue was found, IBM 
would address it, but not the potential results of a scan.

Dennis Roach
GHG Corporation
Lockheed Martin Mission Services
Facilities Design and Operations Contract
Strategic Technical Engineering
NASA/JSC
Address:
   2100 Space Park Drive 
   LM-15-4BH
   Houston, Texas 77058
Mail:
   P.O. Box 58487
   Mail Code H4C
   Houston, Texas 77258-8487
Phone:
   Voice:  (281)336-5027
   Cell:   (713)591-1059
   Fax:    (281)336-5410
E-Mail:  dennis.ro...@lmco.com

All opinions expressed by me are mine and may not agree with my employer or any 
person, company, or thing, living or dead, on or near this or any other planet, 
moon, asteroid, or other spatial object, natural or manufactured, since the 
beginning of time.

-----Original Message-----
From: IBM Mainframe Discussion List [mailto:IBM-MAIN@bama.ua.edu] On Behalf Of 
Ray Overby

>>
>> Todd Burrell wrote:
>>> I got the following info from one of our security folks today about a
> potential
>>> security exposure with the HMC.   Is it valid that the HMC has a RIP 
>>> listener
>>> active, or could I potentially turn it off?  Any info about this would be
> helpful
>>> so I can get the security scan group off my back.  Here was the decription
> of
>>> the violation:
>>>
>>> Synopsis :
>>>
>>> Routing tables can be modified.
>>>
>>> Description :
>>>
>>> The remote RIP listener accepts routes that are not sent by a
>>> neighbor.
>>>
>>> This cannot happen in the RIP protocol as defined by RFC2453, and
>>> although the RFC is silent on this point, such routes should probably
>>> be ignored.
>>>
>>> A remote attacker might use this flaw to access the local network if
>>> it is not protected by a properly configured firewall, or to hijack
>>> connections.
>>>
>>> Solution :
>>>
>>> Either disable the RIP listener if it is not used, use RIP-2 in
>>> conjunction with authentication, or use another routing protocol.
>>>
>>> Risk Factor :
>>>
>>> High / CVSS Base Score : 7.5

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@bama.ua.edu with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to