This is in regard to the recent SNMP vulnerabilities mentioned
in: http://www.cert.org/advisories/CA-2002-03.html
I've updated all my Linux systems with ucd-snmp-4.2.3-1.7.2.3
which is supposed to explicitly fix the problems found. But,
I have some "other" systems which I haven't been able to find
updates for (yet.) Most of these systems are set up only to
process requests (read only) from one or two specific managers.
Could someone who knows more about this comment on whether or
not controlling the "authorized" managers provides *any* protection
whatever from the vulnerabilities found (mainly the buffer overflow
problem.)
I guess this basically amounts to asking whether the buffer overflow
problems found happen before or after the logic that screens for
"authorized" managers. I realize that this depends on the specific
code, but as most of these are all ports of the same few SNMP
implementations I thought that some knowledgeable person might
be able to make some generic comments.
2nd question: I have a computer running Microsoft Windows 2001 on
which I'd like to put an SNMP agent that is capable of reporting on the
interface statistics for the Ethernet (an Intel Pro/100 VE card if that
matters)
I'm not at all familiar which SNMP Agents (or much else) on Microsoft
Windows platforms. Can anyone recommend a good implementation, which
hopefully addresses the recent SNMP vulnerabilities, and has the
ability to control which managers can query?
Thanks!
-Mike