[Top] [All Lists]

Re: [nv-l] CA-2002-03 followup question

To: "Treptow, Craig" <Treptow.Craig@principal.com>
Subject: Re: [nv-l] CA-2002-03 followup question
From: netview@toddh.net (Todd H.)
Date: 06 Mar 2002 16:38:03 -0600
Cc: "NetView List (E-mail)" <nv-l@lists.tivoli.com>
Reply-to: nv-l@lists.tivoli.com
"Treptow, Craig" <Treptow.Craig@principal.com> writes:
> Last month, I read this statement from Todd H. claiming Netview is
> clean.  

Don't take my word for it--I was commenting on the initial statement
released in the alert.  

I just checked back and it seems they've added a substantial amount of
additional info that indicates things you need to check, and the story
has changed dramatically:

from http://www.cert.org/advisories/CA-2002-03.html  today:

    Tivoli Systems

    IBM Tivoli has identified that, in the absence of properly configured
    perimeter firewall protection, the following Tivoli products are
    potentially vulnerable with respect to the CERT Advisory
        Tivoli NetView for OS/390 Version 1 Release 2, 3 and 4
        Tivoli Enterprise Console (SNMP adapter only)
        Tivoli Storage Network Manager
        Tivoli NetView for Unix Version 7.1and earlier
        Tivoli NetView for Windows Version 7.1 and earlier


    Tivoli NetView for Unix, Tivoli NetView for Windows 

    The trap handling subsystems are vulnerable to a service
    interruption related to VU#107186.  The Mid-Level Manager agents
    on some platforms are vulnerable to a service interruption related
    to VU#854306.  These conditions are present in Tivoli NetView V7.1
    and earlier.  Solutions are currently being tested and will be
    available in an upcoming service release.

In contrast, the original release of the CERT advisory on Feb 12 was
    Tivoli Systems
    Our analysis indicates that this vulnerability does not affect the
    Tivoli NetView product.

Todd H.

<Prev in Thread] Current Thread [Next in Thread>

Archive operated by Skills 1st Ltd

See also: The NetView Web