Computer Security
[EN] securityvulns.ru no-pyccku


Related information

  Multiple SNMP problems

  [Full-Disclosure] Emulex FibreChannel Hub Vulnerable to SNMP DoS Attack

  Brocade Firmware SNMP Vulnerability

  iDEFENSE Security Advisory 10.02.2002: Net-SNMP DoS Vulnerability

  Entercept Ricochet Security Advisory: Solaris snmpdx Vulnerabilities

From:MICROSOFT <secure_(at)_microsoft.com>
Date:13.02.2002
Subject:Security Bulletin MS02-006

-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------
Title:      Unchecked Buffer in SNMP Service Could Enable Arbitrary
           Code to be Run
Date:       12 February 2002
Software:   Microsoft Windows 95, 98, 98SE, NT 4.0, NT 4.0 Terminal
           Server Edition, 2000, XP
Impact:     Denial of Service, potentially run code of
           attacker's choice
Max Risk:   Moderate
Bulletin:   MS02-006

Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/MS02-006.asp.
- ----------------------------------------------------------------------

Issue:
======
Simple Network Management Protocol (SNMP) is an Internet standard
protocol for managing disparate network devices such as firewalls,
computers, and routers. All versions of Windows except Windows ME
provide an SNMP implementation, which is neither installed nor
running by default in any version.

A buffer overrun is present in all implementations. By sending a
specially malformed management request to a system running an
affected version of the SNMP service, an attacker could cause a
denial of service. In addition, it is possible that he cause code
to run on the system in LocalSystem context. This could
potentially give the attacker the ability to take any desired
action on the system.

A patch is under development to eliminate the vulnerability.
In the meantime, Microsoft recommends that customers who use the
SNMP service disable it temporarily. Patches will be available
shortly, at which time we will re-release this bulletin with
updated details.

Mitigating Factors:
====================
- The SNMP service is neither installed nor running by default
  in any version of Windows.

- Standard firewalling practices recommend blocking the port
  over which SNMP operates (UDP ports 161 and 162). If these
  recommendations have been followed, the vulnerability could
  only be exploited by an intranet user.

- Standard security recommendations recommend against using SNMP
  except on trusted networks, as the protocol, by design,
  provides minimal security.

Risk Rating:
============
- Internet systems: Low
- Intranet systems: Moderate
- Client systems: Moderate

Patch Availability:
===================
- A patch is under development and will be available shortly.
  When this happens, we will re-release this bulletin with
  information on how to obtain and install the patch.
  Please read the Security Bulletin at
  http://www.microsoft.com/technet/security/bulletin/ms02-006.asp
  for information on steps to protect against the vulnerability
  until the patch is ready.

- ---------------------------------------------------------------------

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS
ALL
WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
IN NO EVENT
SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES
WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL,
LOSS OF
BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR
ITS
SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME
STATES DO
NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL
OR
INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.

-----BEGIN PGP SIGNATURE-----
Version: PGP 7.1

iQEVAwUBPGmvbY0ZSRQxA/UrAQEcrAgAjbz5eMUJhHULLp6NV9cW9jhgx+BNZGTx
8l72yIVOrmBbjAN4cEjUJRCbW5HiVzdGjyGkM+J/ebkXRP9mQMUrDKuFjqbtzlu7
B64A2Jj4ZInAS++lDKAUlO9kjVmwApj4jTUK1THxY+/B7x6EPAAyCe8NtXz5lpEf
MUbiRsPw4TemG3TfkJgW0KIE7GpqG6zcWJZQBdOAEGGIYVN64n7EY3n5Qm4d4jdQ
1YzhsZQOU60ANi4BTQ5Jyb2wgn63Bt2CYa84OzLrzL1YIGhFQSj8teFNmecXgtOf
DuRrO2nXpC2hc4Cc2pbuW8t8ULCVDJNqsMOGvQxF+xKA7U6ZAohbbA==
=dMSU
-----END PGP SIGNATURE-----



*******************************************************************

You have received this e-mail bulletin as a result of your subscription to the
Microsoft Product Security Notification   Service.  For more information on this
service, please visit http://www.microsoft.com/technet/security/notify.asp.

To verify the digital signature on this bulletin, please download our PGP key at
http://www.microsoft.com/technet/security/notify.asp.

To cancel your subscription, click on the following link
mailto:[email protected]osoft.
com?subject=UNSUBSCRIBE
to create an unsubscribe e-mail.

To stop all e-mail newsletters from microsoft.com, click on the following link
mailto:[email protected]osoft.
com?subject=STOPMAIL
to create an unsubscribe e-mail.  You can manage all your Microsoft.com
communication preferences from http://www.microsoft.com/misc/unsubscribe.htm

For security-related information about Microsoft products, please  visit the
Microsoft Security Advisor web site at http://www.microsoft.com/security.

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod