As demonstrated by the security group, some vendor SNMP implementations
crash when this new test suite is run against them -- even when SNMP is not
actively listening! I do agree about protecting SNMP devices, but this is
much more difficult from INSIDE an SNMP network.

-----Original Message-----
From: Steven A. Ridder [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, February 13, 2002 11:12 AM
To: [EMAIL PROTECTED]
Subject: SNMP- (S)ecurity is (N)ot (M)y (P)roblem [7:35329]


It's kind of high but not really.  Most networks have SNMP pretty well
hidden behind firewalls, or turned off if on the net, but if it's open, then
I can ddos you and / or add code into the memory space of the crashed SNMP
process (servers).  There haven't been many attacks reported yet from the
firewall logs people have examined - YET.  Maybe the script kiddies are just
waiting to write the good tools.

But, as I said earlier, a properly designed system will have SNMP protected.

""Frederick R. Carlson""  wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> All,
> What is the real risk in the newly announced CERT bullitin on SNMP.
>
> Its at : http://www.cert.org/advisories/CA-2002-03.html
>
> Thanks in advance,
> FRC




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=35332&t=35329
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to