CERTA-2002-AVI-039

Vulnerability from certfr_avis - Published: - Updated:

Un utilisateur mal intentionné peut utiliser une vulnérabilité de l'agent SNMP pour causer un déni de service ou pour obtenir les privilèges de l'administrateur.

Description

Les tests effectués par l'université finlandaise d'Oulu ont mis en évidence la présence de vulnérabilités dans les routines de décodage et de traitement des messages SNMP dans de nombreuses implémentations (se référer au bulletin d'alerte CERTA-2002-ALE-004 du CERTA).

Une vulnérabilité de l'agent SNMP permet à un utilisateur mal intentionné d'obtenir les privilèges administrateur ou de provoquer un déni de service sur les équipements Compaq.

Cette vulnérabilité est exploitable à distance.

Solution

Se référer au bulletin de sécurité Compaq (voir paragraphe Documentation) pour appliquer le correctif selon l'appareil utilisé.

None
Impacted products
Vendor Product Description
N/A N/A Compaq NonStop Himalaya Servers ;
N/A N/A Compaq Tru64 Unix ;
N/A N/A les produits Compaq/Microcrom.
N/A N/A Compaq TCP/IP Services pour OpenVMS ;
N/A N/A Insight Management Suite ;
N/A N/A les produits StorageWorks ;
N/A N/A Deskpro, Professional Workstation, Armada, Evo ;
N/A N/A le matériel Compaq SANworks ;
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Compaq NonStop Himalaya Servers ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Compaq Tru64 Unix ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "les produits Compaq/Microcrom.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Compaq TCP/IP Services pour OpenVMS ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Insight Management Suite ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "les produits StorageWorks ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Deskpro, Professional Workstation, Armada, Evo ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "le mat\u00e9riel Compaq SANworks ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nLes tests effectu\u00e9s par l\u0027universit\u00e9 finlandaise d\u0027Oulu ont mis en\n\u00e9vidence la pr\u00e9sence de vuln\u00e9rabilit\u00e9s dans les routines de d\u00e9codage et\nde traitement des messages SNMP dans de nombreuses impl\u00e9mentations (se\nr\u00e9f\u00e9rer au bulletin d\u0027alerte CERTA-2002-ALE-004 du CERTA).\n\nUne vuln\u00e9rabilit\u00e9 de l\u0027agent SNMP permet \u00e0 un utilisateur mal\nintentionn\u00e9 d\u0027obtenir les privil\u00e8ges administrateur ou de provoquer un\nd\u00e9ni de service sur les \u00e9quipements Compaq.\n\nCette vuln\u00e9rabilit\u00e9 est exploitable \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 Compaq (voir paragraphe\nDocumentation) pour appliquer le correctif selon l\u0027appareil utilis\u00e9.\n",
  "cves": [],
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Compaq SSRT0779 :",
      "url": "http://ftp.support.compaq.com/patches/.new/html/SSRT0779.shtml"
    }
  ],
  "reference": "CERTA-2002-AVI-039",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2002-02-21T00:00:00.000000"
    },
    {
      "description": "seconde version : Modification des r\u00e9f\u00e9rences et du contenu du bulletin Compaq.",
      "revision_date": "2002-04-23T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Un utilisateur mal intentionn\u00e9 peut utiliser une vuln\u00e9rabilit\u00e9 de\nl\u0027agent SNMP pour causer un d\u00e9ni de service ou pour obtenir les\nprivil\u00e8ges de l\u0027administrateur.\n",
  "title": "Vuln\u00e9rabilit\u00e9 de SNMP sur Compaq",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 SSRT0779 de Compaq",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…