| To: | nv-l@lists.tivoli.com |
|---|---|
| Subject: | [nv-l] CERT security advisory on multiple SNMP implementations |
| From: | netview@toddh.net (Todd H.) |
| Date: | 12 Feb 2002 15:53:41 -0600 |
Oy...there goes the neighborhood. NetView is clean, but a bunch of
devices in the average network are likely to be vulnerable:
http://www.cert.org/advisories/CA-2002-03.html
I'm curious if anyone know how NetView got branded as not vulnerable
to trap format string attacks without the dependency on the security
e-Fix from 6.02 that came out in response to:
http://www.cert.org/advisories/CA-2001-24.html
Perhaps because that vulnerability only existed if you launched
external scripts in event processing forked by ovactiond?
--
Todd H.
http://www.toddh.net/
|
| <Prev in Thread] | Current Thread | [Next in Thread> |
|---|---|---|
| ||
| Previous by Date: | RE: [nv-l] Looking for advice, Allison, Jason (JALLISON) |
|---|---|
| Next by Date: | [nv-l] Re: [NV-L] Varbinds contained an illegal character, netview |
| Previous by Thread: | [nv-l] netmon -A ?, Westphal, Raymond |
| Next by Thread: | Re: [nv-l] CERT security advisory on multiple SNMP implementations, Leslie Clark |
| Indexes: | [Date] [Thread] [Top] [All Lists] |
Archive operated by Skills 1st Ltd
See also: The NetView Web