The CERT Vulnerability Note VU#854306 indicated that the SNMP processing
of
GetRequest, SetRequest, GetNextRequest, GetResponse, and Trap has
vulnerablities.
These weaknesses include "denial-of-service conditions, format string
vulnerabilities, and buffer overflows."  In addition, "some
vulnerabilities do not require the request message to use the correct
SNMP community string".

Which means, the SNMP service can be used to compromise OS/400.

IBM responded with:  "Based upon the results of running the test suites
we have determined that our version of SNMP shipped with AIX is NOT
vulnerable."

If Dr. Frank's hypothesis is right, IBM SNMP implementation is probably
the same for AIX as it is for OS/400.  Which makes my worries go away -
- Right??????

I know that SNMP is used regularly on internal networks.  Some people
are even using it to drive their AS/400 printers.  A couple of customers
want to remotely manage their equipment, using VPN connections on the
Internet.  SNMP could be the right tool, but only if internal hackers
can be kept out!  With the CERT notification,  and in general, is a
properly configured AS/400 susceptible to SNMP attacks?

Best Regards

Fritz Hayes
Atwater Associates
<snip>

|
|We run SNMP on the AS/400 and provide SNMP options in our
|products. What concerns do you have?
|
<snip>
|>
|> So, who out there is running and using SNMP on their AS/400, iSeries
|> box?
|>
|> A second question, who is using the SNMP protocol over the Internet?
|>




As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow-Ups:
Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.