[13966] in bugtraq

home help back first fref pref prev next nref lref last post

Re: AIX SNMP Defaults

daemon@ATHENA.MIT.EDU (Troy Bollinger)
Tue Feb 22 21:20:48 2000

Mail-Followup-To: Michal Zalewski <lcamtuf@DIONE.IDS.PL>,
                  BUGTRAQ@SECURITYFOCUS.COM
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-Id:  <20000221161442.A29738@austin.ibm.com>
Date:         Mon, 21 Feb 2000 16:14:42 -0600
Reply-To: Troy Bollinger <troy@AUSTIN.IBM.COM>
From: Troy Bollinger <troy@AUSTIN.IBM.COM>
X-To:         Michal Zalewski <lcamtuf@DIONE.IDS.PL>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <Pine.LNX.4.21.0002171122280.28680-100000@dione.ids.pl>; from
              lcamtuf@DIONE.IDS.PL on Thu, Feb 17, 2000 at 11:28:54AM +0100

Quoting Michal Zalewski (lcamtuf@DIONE.IDS.PL):
> On Tue, 15 Feb 2000, harikiri wrote:
>
> > It appears that on the above releases of AIX, the SNMP daemon is
> > enabled by default and two community names are enabled with read/write
> > privileges. The community names are "private" and "system", but are
> > only allowed from localhost connections. Nevertheless, a local user
> > may install an SNMP client, and modify sensitive variables.
>
> SNMP requests with no authentication except for source-IP comparsion, are
> spoofable.
>

All recent versions of AIX discard packets with a source address of
loopback when the packet comes in on an external interface.  The
following APARs have been available for over 2 years:

   Abstract:   SECURITY: discard loopback packets on external interfaces
   4.1.x APAR: IX71366
   4.2.x APAR: IX71405
   4.3.x APAR: included in 4.3.0 initial release

--
Troy Bollinger                            troy@austin.ibm.com
AIX Security Development        security-alert@austin.ibm.com
PGP keyid: 1024/0xB7783129 Troy's opinions are not IBM policy

home help back first fref pref prev next nref lref last post