CVE-2002-1408
CVSS7.5
发布时间 :2003-04-11 00:00:00
修订时间 :2008-09-05 16:30:31
NMCOS    

[原文]Unknown vulnerability or vulnerabilities in HP OpenView EMANATE 14.2 snmpModules allow the SNMP read-write community name to be exposed, related to (1) "'read-only' community access," and/or (2) an easily guessable community name.


[CNNVD]HP OpenView EMANATE 读写共同体串泄漏漏洞(CNNVD-200304-075)

        
        HP OpenView EMANATE系统通过模块化、可扩展的管理代理来拓展SNMP管理的范围。一个EMANATE代理系统由一个主代理加很多支持不同MIB模块的子代理组成。
        HP OpenView EMANATE的snmp代理存在一个缺省的只读共同体串,攻击者可以利用这个共同体串来读取一个MIB分支获取其他的共同体串。如果攻击者获取了某些可读/写的共同体串,就可能获取对系统的未授权访问,并可能造成拒绝服务攻击。
        <*链接:http://archives.neohapsis.com/archives/hp/2002-q3/0041.html
        *>

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:hp:openview_emanate_snmp_agent:14.2HP OpenView Emanate SNMP Agent 14.2
cpe:/o:hp:vvos:11.04HP VVOS 11.04

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1408
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-1408
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200304-075
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/5428
(VENDOR_ADVISORY)  BID  5428
http://www.iss.net/security_center/static/9814.php
(VENDOR_ADVISORY)  XF  hp-emanate-default-snmp(9814)
http://online.securityfocus.com/advisories/4360
(VENDOR_ADVISORY)  HP  HPSBUX0208-208

- 漏洞信息

HP OpenView EMANATE 读写共同体串泄漏漏洞
高危 设计错误
2003-04-11 00:00:00 2005-10-20 00:00:00
远程  
        
        HP OpenView EMANATE系统通过模块化、可扩展的管理代理来拓展SNMP管理的范围。一个EMANATE代理系统由一个主代理加很多支持不同MIB模块的子代理组成。
        HP OpenView EMANATE的snmp代理存在一个缺省的只读共同体串,攻击者可以利用这个共同体串来读取一个MIB分支获取其他的共同体串。如果攻击者获取了某些可读/写的共同体串,就可能获取对系统的未授权访问,并可能造成拒绝服务攻击。
        <*链接:http://archives.neohapsis.com/archives/hp/2002-q3/0041.html
        *>

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 在snmpd.conf中建立一个VIEW,限制/拒绝访问communityGroup。例如:
        # The VIEW: qualifier further restricts access using the community
        # name to the sub-set of the agent's supported MIB identified by
        # the space list of "MIB view sub-trees". A view sub-tree may be
        # either the object identifier (1.3.6.1.2.1.1) or object name
        # (system) of the MIB sub-tree to be included. The '-' character
        # may be used to exclude an oid/name from the view. For example,
        #
        # You can resolve this issue by adding a VIEW: qualifier to each
        # line containing a get-community-name.
        # The least restrictive VIEW: qualifier which denies access to the
        # communityTable is:
        get-community-name: yyyyyy VIEW: 1.3.6.1 -communityMIB
        厂商补丁:
        HP
        --
        HP已经为此发布了一个安全公告(HPSBUX0208-208)以及相应补丁:
        HPSBUX0208-208:Sec. Vulnerability in HP OpenView EMANATE14.2
        链接:
        补丁下载:
        Win NT/2k: NNM_00936 EMANATE14.2 snmpModules of SNMPv2 MIB
        
        http://support.openview.hp.com/cpe/cgi-bin/saveAs?productName=/emanate/14.2/intelNT_4.X/NNM_00936.EXE

        Solaris 2.6,7,8: PSOV_03193 EMANATE14.2 snmpModules of SNMPv2 MIB
        
        http://support.openview.hp.com/cpe/cgi-bin/saveAs?productName=/emanate/14.2/sparc_2.X/PSOV_03193

        hp-ux 11.X: PHSS_27570 EMANATE14.2 snmpModules of SNMPv2 MIB
        
        http://support.openview.hp.com/cpe/cgi-bin/saveAs?productName=/emanate/14.2/s700_800_11.X/PHSS_27570

        hp-ux 10.20: PHSS_27569 EMANATE14.2 snmpModules of SNMPv2 MIB
        
        http://support.openview.hp.com/cpe/cgi-bin/saveAs?productName=/emanate/14.2/s700_800_10.X/PHSS_27569

- 漏洞信息

11343
HP OpenView EMANATE snmpModules Information Disclosure
Remote / Network Access Information Disclosure
Loss of Confidentiality
Exploit Public

- 漏洞描述

The Emanate SNMP agent supplied with HP OpenView and HP-UX contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when someone who knows a read-only community string performs an SNMP walk query in the snmpV2.snmpModules branch, which will disclose all the community names configured on the host, resulting in a loss of confidentiality and possible unauthorized system access.

- 时间线

2002-04-08 Unknow
2002-04-08 Unknow

- 解决方案

HP has released a patch to partially address this vulnerability. Install Emanate Release 14.2 patches (NNM_00936, PHSS_27569, PHSS_27570, PSOV_03193 or later). A complete solution also requires adding a VIEW: qualifier to each line containing a get-community-name in snmpd.conf as given below: get-community-name: <get-community-name> VIEW: 1.3.6.1 -communityMIB Prior to the patch being applied, you should use -snmpModules instead of -communityMIB.

- 相关参考

- 漏洞作者

- 漏洞信息

HP EMANATE 14.2 Predictable SNMP Community String Vulnerability
Design Error 5428
Yes No
2002-08-08 12:00:00 2009-07-11 02:56:00
Vulnerability first detailed in HP Security Bulletin HPSBUX0208-208.

- 受影响的程序版本

HP OpenView Emanate SNMP Agent 14.2 Win NT/2k
HP OpenView Emanate SNMP Agent 14.2 Solaris 2.X
HP OpenView Emanate SNMP Agent 14.2 HP-UX 11.X
HP OpenView Emanate SNMP Agent 14.2 HP-UX 10.20
HP HP-UX (VVOS) 11.0 4

- 漏洞讨论

HP EMANATE 14.2 systems use a predictable default community string. Attackers who can guess the SNMP community string may gain unauthorized SNMP access, which may result in disclosure of sensitive information.

The vulnerability affects EMANATE 14.2 designed for Sun Solaris, HP-UX and Windows NT operating systems.

- 漏洞利用

This issue may be exploited using a SNMP client.

- 解决方案

HP has issued a revised advisory. New patches for HP-UX VVOS are available. Users are advised to apply the following patches:


HP HP-UX (VVOS) 11.0 4

HP OpenView Emanate SNMP Agent 14.2 Solaris 2.X

HP OpenView Emanate SNMP Agent 14.2 HP-UX 10.20

HP OpenView Emanate SNMP Agent 14.2 Win NT/2k

HP OpenView Emanate SNMP Agent 14.2 HP-UX 11.X

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站