As demonstrated by the security group, some vendor SNMP implementations crash when this new test suite is run against them -- even when SNMP is not actively listening! I do agree about protecting SNMP devices, but this is much more difficult from INSIDE an SNMP network.
-----Original Message----- From: Steven A. Ridder [mailto:[EMAIL PROTECTED]] Sent: Wednesday, February 13, 2002 11:12 AM To: [EMAIL PROTECTED] Subject: SNMP- (S)ecurity is (N)ot (M)y (P)roblem [7:35329] It's kind of high but not really. Most networks have SNMP pretty well hidden behind firewalls, or turned off if on the net, but if it's open, then I can ddos you and / or add code into the memory space of the crashed SNMP process (servers). There haven't been many attacks reported yet from the firewall logs people have examined - YET. Maybe the script kiddies are just waiting to write the good tools. But, as I said earlier, a properly designed system will have SNMP protected. ""Frederick R. Carlson"" wrote in message [EMAIL PROTECTED]">news:[EMAIL PROTECTED]... > All, > What is the real risk in the newly announced CERT bullitin on SNMP. > > Its at : http://www.cert.org/advisories/CA-2002-03.html > > Thanks in advance, > FRC Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=35332&t=35329 -------------------------------------------------- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]