exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ISS Security Advisory November 2nd, 1998

ISS Security Advisory November 2nd, 1998
Posted Nov 24, 1998

Internet Security Systems (ISS) X-Force has researched a hidden SNMP community string that exists in HP OpenView. This community may allow unauthorized access to certain SNMP variables. Attackers may use this hidden community to learn about network topology as well as modify MIB variables.

SHA-256 | c4509bb8bc0c9bb4b1232aee4c6d674e2cad3ead96cd10394a1c92336b597242

ISS Security Advisory November 2nd, 1998

Change Mirror Download

From xforce@ISS.NET Tue Nov 3 20:23:08 1998
From: X-Force <xforce@ISS.NET>
To: BUGTRAQ@netspace.org
Date: Mon, 2 Nov 1998 17:56:01 -0500
Subject: ISS Security Advisory: Hidden SNMP community in HP OpenView

-----BEGIN PGP SIGNED MESSAGE-----

ISS Security Advisory
November 2nd, 1998

Hidden SNMP community in HP OpenView

Synopsis:

Internet Security Systems (ISS) X-Force has researched a hidden SNMP community
string that exists in HP OpenView. This community may allow unauthorized
access to certain SNMP variables. Attackers may use this hidden community to
learn about network topology as well as modify MIB variables.

Affected Versions:

ISS X-Force has confirmed that this vulnerability is present in HP OpenView
Version 5.02. Earlier versions are believed to be vulnerable. HP-UX 9.X and
HP-UX 10.X SNMP agents are vulnerable if OpenView is installed. OpenView for
Solaris 2.X is also vulnerable. OpenView for Windows NT is not vulnerable.

Fix Information:

HP has made the following patches available:

PHSS_16800: HP-UX Version 10.X
PHSS_16799: HP-UX Version 9.X
PHOV_02190: Solaris Version 2.X

Description:

All hosts in a managed network rely on the proper delivery and collection of
SNMP data. This vulnerability allows remote attackers access to portions of
the MIB tree used for configuration and maintenance of the SNMP agent.

Attackers may use this hidden community from remote to gain information
otherwise reserved for authorized users. Attackers can also use this community
to disrupt collection of data over SNMP as well as sever communication between
Collection Agents and Management stations.

Additional Information:

ISS Internet Scanner and ISS RealSecure real-time intrusion detection software
have the capability to detect these vulnerabilities.

- ----------

Copyright (c) 1998 by Internet Security Systems, Inc.

Permission is hereby granted for the redistribution of this alert
electronically. It is not to be edited in any way without express consent
of X-Force. If you wish to reprint the whole or any part of this alert in
any other medium excluding electronic medium, please e-mail xforce@iss.net
for permission.

Disclaimer
The information within this paper may change without notice. Use of this
information constitutes acceptance for use in an AS IS condition. There are
NO warranties with regard to this information. In no event shall the author
be liable for any damages whatsoever arising out of or in connection with
the use or spread of this information. Any use of this information is at
the user's own risk.

X-Force PGP Key available at: http://www.iss.net/xforce/sensitive.html as
well as on MIT's PGP key server and PGP.com's key server.

X-Force Vulnerability and Threat Database: http://www.iss.net/xforce

Please send suggestions, updates, and comments to:
X-Force <xforce@iss.net> of Internet Security Systems, Inc.


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a
Charset: noconv

iQCVAwUBNj4p6DRfJiV99eG9AQHzUQQAiQuk5dH2ITvRrkUnDcbnFXpXL3cYrRr1
qI1njwegNburPEiKV14BPCRAVCcn2uWMpkd4E0ChsmMqwBspM3YoFdNqEuzhsqac
pB0CoUizcltd2kZFBbeo2BcIrqSWKAxT326pf9s4Q9Pv7h+1uUlsgNYrH0YSMA7b
l6bnK7VDfUI=
=H2mz
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    24 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close