- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- SNMP vulnerabilities
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Discussions
Forums
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО11-25-2008 07:22 PM
тАО11-25-2008 07:22 PM
1)SNMPv1Discovery: SNMP version 1 detected
2)SNMPv2Discovery: SNMP version 2 detected
Details are as follows
SNMP (Simple Network Management Protocol) is the primary standard for Internet network management. SNMP services are included
in almost every operating system, router, switch, cable or DSL modem, and firewall. Various implementations of SNMPv1 are vulnerable
to a wide range of attacks. Incorrectly formatted input in SNMP messages can crash the operating systems and devices that use SNMP.
These vulnerabilities may be possible to exploit remotely, allowing an attacker to compromise remote systems and devices. SNMP
packets containing invalid fields or data lengths can indicate an attack against SNMP.
What are the solutions available?I got referred to CERT Advisory CA-2002-03 but not sure what needs to be done.
Thanks a lot.
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО11-26-2008 10:33 AM
тАО11-26-2008 10:33 AM
Re: SNMP vulnerabilities
JetDirect Firmware Version State
========================== =====
-->> X.08.32 and lower VULNERABLE
-->> (where X = A through K)
-->> X.21.00 and higher NOT vulnerable
-->> (where X = L through P)
You can upgrade the firmware on your printservers to version L.21.00 or higher.
If you don't use the SNMP service, you can disable it. Connect to the jetdirect printserver via telnet or a web browser and disable it. Not that not all jetdirect models allow you to disable it.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО11-26-2008 06:13 PM
тАО11-26-2008 06:13 PM
Re: SNMP vulnerabilities
It has nothing to do with network printers. Our environments host websites. So we are mainly concerned with people who can hack into our systems. The vulnerabilities indicated are what need to be resolved.
For your necessary advice.
Regards
Feng Lin
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО11-27-2008 04:21 AM
тАО11-27-2008 04:21 AM
Re: SNMP vulnerabilities
So do you have SNMP running anywhere? SNMP could be running on any network device such as a server, a network printer, a network switch, a fiber switch, a disk array etc. You need to find out if you have it running and upgrade it as per the CERT alert and each vendor's recommendation. If you do not use the snmp service to get status information on each device you should turn it off.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО11-28-2008 02:21 AM
тАО11-28-2008 02:21 AM
Re: SNMP vulnerabilities
SNMP version 2 is installed on the HP-UX servers and we have received the vulnerabilities indicated in my first post.
Does this mean I need to upgrade to version 3? Are there other alternatives? Any patches will solve this issue in SNMP version 2? We need snmp for monitoring purposes.
Regards
Feng Lin
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО11-28-2008 06:15 AM
тАО11-28-2008 06:15 AM
Re: SNMP vulnerabilities
http://www.cert.org/advisories/CA-2002-03.html
SOLUTION: Apply patches or implement workarounds. See below.
For HP-UX releases:
PHSS_26137 s700_800 HP-UX 10.20 OV EMANATE14.2 Agent
PHSS_26138 s700_800 HP-UX 11.X OV EMANATE14.2 Agent
PSOV_03087 Solaris 2.X EMANATE Release 14.2
For systems running OV NNM:
PHSS_26286 s700_800 HP-UX 10.20 ovtrapd large trap fix
PHSS_26287 s700_800 HP-UX 11.X ovtrapd large trap fix
PSOV_03100 Solaris 2.X ovtrapd large trap fix
NNM_00857 NT 4.X/Windows 2000 ovtrapd large trap fix
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО11-28-2008 10:48 PM
тАО11-28-2008 10:48 PM
Re: SNMP vulnerabilities
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО11-29-2008 03:39 PM
тАО11-29-2008 03:39 PM
Re: SNMP vulnerabilities
Bill Hassell, sysadmin
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО11-30-2008 09:46 PM
тАО11-30-2008 09:46 PM
Re: SNMP vulnerabilities
Does patch PHSS_26138 solve the following vulnerabilitie
1) snmp: SNMP can reveal possibly sensitive information about hosts
2) Snmp Get Public Community: SNMP_Get able to retrieve Public Community Name
3) SnmpSysdescr: SNMP SysDescr variable can be returned from remote system
If no, what are the patches that solve the above errors?
FYI, my HP_UX servers are B.11.23.
Thanks a lot.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО12-01-2008 12:43 AM
тАО12-01-2008 12:43 AM
Re: SNMP vulnerabilities
It isn't for 11.23.
>what are the patches that solve the above errors?
Have you looked up CA-2002-03 so see what patches it suggests for HP-UX?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО12-01-2008 02:24 AM
тАО12-01-2008 02:24 AM
Re: SNMP vulnerabilities
I didnt find them on the CA-2002-03. That's why I am asking help from you.
Does PHSS_27858 help? need confirmation from you.
Thanks in advance.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО12-01-2008 05:38 AM
тАО12-01-2008 05:38 AM
Re: SNMP vulnerabilities
Going back to your original question,
> 1)SNMPv1Discovery: SNMP version 1 detected
> 2)SNMPv2Discovery: SNMP version 2 detected
I assume these were reported during a security scan. But were these two reported as actual vulnerabilities or as warnings? These security scans will report if certain services are running even if there is no vulnerability in them. Typically they report alerts if telnet, ftp, SMTP, SNMP and other common services that connect with outside the server.
So the question is, is there really a vulnerability in these two SNMP servers or simply a warning?
On another note installing the latest 11.23 patches for SNMP is always a good idea.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО12-01-2008 05:05 PM
тАО12-01-2008 05:05 PM
Re: SNMP vulnerabilities
If your security bulletin doesn't say how to fix it, it is next to useless.
>Does PHSS_27858 help?
As I mentioned before, no. It isn't for 11.23.
You should be using SWA to do your security checking:
http://www.hp.com/go/swa
You should also sign up for "ITRC security bulletins and patches sign-up":
https://h30046.www3.hp.com/subchoice/country/us/en/subscribe.aspx?subs=ITRC
Here are some other lld threads:
http://forums.itrc.hp.com/service/forums/questionanswer.do?threadId=124304
http://forums.itrc.hp.com/service/forums/questionanswer.do?threadId=123208
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО12-01-2008 06:16 PM
тАО12-01-2008 06:16 PM
Re: SNMP vulnerabilities
What TTr say is correct. The SNMP version 1 and 2 are reported as vulnerabilities by our security team. Criticalities are high for them. Based on the CERT Advisory CA-2002-03,I don't find the right info useful to fix the issue.
Where to download the patches 11.23 snmp?I have been trying to look for them. How to search for them?
Thanks
Feng Lin
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО12-01-2008 06:57 PM
тАО12-01-2008 06:57 PM
Re: SNMP vulnerabilities
>>CERT Advisory CA-2002-03>>
have they mentioned what patch need's to be patched..? if yes
you can follow the below Link, type-in the Patch_name and download
http://search.hp.com/query.html?charset=iso-8859-1&lk=1&la=en&nh=10&rf=0&qs=&hpvc=sitewide&uf=1&st=1&qt=PHCO_35524
Thanks,
JOhnson
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО12-01-2008 11:07 PM
тАО12-01-2008 11:07 PM
Re: SNMP vulnerabilities
Because 11.23 doesn't have this problem. It isn't listed on TTr's CERT URL.
>Where to download the patches 11.23 snmp?
There isn't any. Searching the HP-UX patch database for snmpd and 11.23 doesn't find any.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО12-01-2008 11:27 PM
тАО12-01-2008 11:27 PM
Re: SNMP vulnerabilities
Then how come the security team come up with these vulnerabilities on the HP-UX B.11.23 servers? Or how I should prove that these vulnerabilities are not harmful to our B.11.23 servers?
Regards
Feng Lin
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО12-01-2008 11:54 PM
тАО12-01-2008 11:54 PM
Re: SNMP vulnerabilities
No clue. Where is a CERT URL that says this?
>Or how I should prove that these vulnerabilities are not harmful to our B.11.23 servers?
Isn't that their job?
Your initial text says:
Various implementations of SNMPv1 are vulnerable
This isn't one of the "various".
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО12-03-2008 09:06 AM
тАО12-03-2008 09:06 AM
SolutionOn another thought is it possible you are NOT using the HP-UX snmp agents and you have installed some other SNMP agents from another monitoring system's software? Where do the SNMP agents that you have running on your 11.23 HP-UX server connect to? Check the snmp processes that you have running on the HP-UX server and verify which ones they are.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО12-03-2008 06:55 PM
тАО12-03-2008 06:55 PM
Re: SNMP vulnerabilities
Can I assume that there are firewall rules that restrict the SNMP access? The objective is to prove that these vulnerabilities won't affect my system.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО12-03-2008 07:18 PM
тАО12-03-2008 07:18 PM
Re: SNMP vulnerabilities
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО12-03-2008 07:57 PM
тАО12-03-2008 07:57 PM
Re: SNMP vulnerabilities
Because the CERN URL doesn't mention B.11.23.
And using improper circular reasoning, because there is no patch for it. :-)
>Can I assume that there are firewall rules that restrict the SNMP access?
I assume that the fix was to check for garbage SNMP requests.