NOVL-2002-2961546 - SNMPv1 Trap and RequestHandlingVulnerabilities

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

For Immediate Disclosure

============================== Summary ==============================

 Security Alert: NOVL-2002-2961546
          Title: SNMPv1 Trap and Request Handling Vulnerabilities
           Date: 15-Feb-2002
       Revision: Original Security Alert, Version 4 of the TID
   Product Name: SNMP
 OS/Platform(s): Netware 4.11, 4.2, 5.0, 5.1, 6.0
  Reference URL: http://support.novell.com/servlet/tidfinder/2961546
    Vendor Name: Novell, Inc. 
     Vendor URL: http://www.novell.com
Security Alerts: http://support.novell.com/security-alerts 
        Affects: SNMPLOG.NLM, SNMPLOG.MSG, SNMP.NLM, SNMP.MSG
    Identifiers: CERT VU#107186, VU#854306, CA-2002-03, 
                 CVE CAN-2002-0012  
        Credits: CERT Credits Oulu University Secure Programming Grp.

============================ Description ============================

This Security Alert repeats information previously published by
Novell at our Support web site.

This patch addresses the SNMP Vulnerability issues listed in the CERT
documents VU#107186, VU#854306 referenced above.   

============================== Impact ===============================

The files SNMPLOG.NLM & SNMPLOG.MSG are the same as the ones we ship
with NW5.1 SP4 and NW6 SP1. But the files SNMP.NLM & SNMP.MSG are
newer in this TID than the files shipping in NW5.1 SP4 and NW 6 SP1.
Hence if the support pack is already applied then only SNMP.NLM &
SNMP.MSG has to be replaced else all the the four files have to be
replaced. 

These modules will not be in a NetWare 4.x Support Pack. This was
tested on 4.11, 4.2, 5.0, 5.1, and 6.0 only.

======================== Recommended Actions ========================

Replace the files on your server with the ones in this patch in the
appropriate directories. The NLMs should go to sys:\system folder and
msg files should go to sys:\system\nls\4 folder. 

After you replace them you need to unload and reload SNMP and the
best way to do that is to reboot the server.

See detailed instructions in the referenced Technical Information
Document (TID) http://support.novell.com/servlet/tidfinder/2961546.

============================ DISCLAIMER =============================

The content of this document is believed to be accurate at the time
of publishing based on currently available information. However, the
information is provided "AS IS" without any warranty or
representation. Your use of the document constitutes acceptance of
this disclaimer. Novell disclaims all warranties, express or implied,
regarding this document, including the warranties of merchantability
and fitness for a particular purpose. Novell is not liable for any
direct, indirect, or consequential loss or damage arising from use
of, or reliance on, this document or any security alert, even if
Novell has been advised of the possibility of such damages and even
if such damages are foreseeable.

============================ Appendices =============================

None

================ Contacting Novell Security Alerts ==================

To report suspected security vulnerabilities in Novell products, send
email to
            secure@novell.com

PGP users may send signed/encrypted information to us using our PGP
key, available from the pgpkeys.mit.edu server, or our website at: 

            http://support.novell.com/security-alerts


Security Alerts, Novell, Inc. PGP Key Fingerprint:

F5AE 9265 0A34 F84E 580E  9B87 3AC1 1974 DE05 0FDB

========================= Revision History ==========================
       Original: 15-Feb-2002 - Original Publication
   TID Last Rev: 07-Mar-2002
 Security Alert: 13-Aug-2002


-----BEGIN PGP SIGNATURE-----
Version: PGP Personal Security 7.0.3

iQA/AwUBPVl62DrBGXTeBQ/bEQJkcgCgg634UIQ9rsYuTcrgz3ezw2NfUWUAoPrB
i7iP3K5Qr/g9LWm6ectxOqNw
=G3eT
-----END PGP SIGNATURE-----

[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux