Vulnerabilidad en SNMPv3 HMAC (CVE-2008-0960)
Gravedad CVSS v2.0:
ALTA
Tipo:
CWE-287
Autenticación incorrecta
Fecha de publicación:
10/06/2008
Última modificación:
09/04/2025
Descripción
Una comprobación SNMPv3 HMAC en (1) Net-SNMP versión 5.2.x anterior a 5.2.4.1, versión 5.3.x anterior a 5.3.2.1 y versión 5.4.x anterior a 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) C-series versión 1.0.0 hasta 2.0.0 de Juniper Session and Resource Control (SRC); (5) Data de NetApp (también se conoce como Network Appliance) ONTAP versiones 7.3RC1 y 7.3RC2; (6) SNMP Research versión anterior a 16.2; (7) múltiples productos Cisco IOS, CatOS, ACE y Nexus; (8) Ingate Firewall versión 3.1.0 y posterior y SIParator versión 3.1.0 y posterior; (9) HP OpenView SNMP Emanate Master Agent versión 15.x; y posiblemente otros productos dependen del cliente para especificar la longitud del HMAC, lo que facilita que los atacantes remotos omitan la autenticación SNMP por medio de un valor de longitud de 1, que solo comprueba el primer byte.
Impacto
Puntuación base 2.0
10.00
Gravedad 2.0
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:cisco:catos:7.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:catos:7.3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:catos:7.4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:catos:8.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:cisco_ios:12.0:s:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:cisco_ios:12.0:sy:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:cisco_ios:12.1:e:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:cisco_ios:12.2:ewa:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:cisco_ios:12.2:jk:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:cisco_ios:12.2:sb:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:cisco_ios:12.2:sg:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:cisco_ios:12.2:sga:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:cisco_ios:12.2:sra:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:cisco_ios:12.2:srb:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:cisco_ios:12.2:src:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html
- http://lists.ingate.com/pipermail/productinfo/2008/000021.html
- http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html
- http://marc.info/?l=bugtraq&m=127730470825399&w=2
- http://marc.info/?l=bugtraq&m=127730470825399&w=2
- http://rhn.redhat.com/errata/RHSA-2008-0528.html
- http://secunia.com/advisories/30574
- http://secunia.com/advisories/30596
- http://secunia.com/advisories/30612
- http://secunia.com/advisories/30615
- http://secunia.com/advisories/30626
- http://secunia.com/advisories/30647
- http://secunia.com/advisories/30648
- http://secunia.com/advisories/30665
- http://secunia.com/advisories/30802
- http://secunia.com/advisories/31334
- http://secunia.com/advisories/31351
- http://secunia.com/advisories/31467
- http://secunia.com/advisories/31568
- http://secunia.com/advisories/32664
- http://secunia.com/advisories/33003
- http://secunia.com/advisories/35463
- http://security.gentoo.org/glsa/glsa-200808-02.xml
- http://securityreason.com/securityalert/3933
- http://sourceforge.net/forum/forum.php?forum_id=833770
- http://sourceforge.net/tracker/index.php?func=detail&aid=1989089&group_id=12694&atid=456380
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1
- http://support.apple.com/kb/HT2163
- http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm
- http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml
- http://www.debian.org/security/2008/dsa-1663
- http://www.kb.cert.org/vuls/id/878044
- http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q
- http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z
- http://www.kb.cert.org/vuls/id/MIMG-7ETS87
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A118
- http://www.ocert.org/advisories/ocert-2008-006.html
- http://www.openwall.com/lists/oss-security/2008/06/09/1
- http://www.redhat.com/support/errata/RHSA-2008-0529.html
- http://www.securityfocus.com/archive/1/493218/100/0/threaded
- http://www.securityfocus.com/archive/1/497962/100/0/threaded
- http://www.securityfocus.com/bid/29623
- http://www.securitytracker.com/id?1020218=
- http://www.ubuntu.com/usn/usn-685-1
- http://www.us-cert.gov/cas/techalerts/TA08-162A.html
- http://www.vmware.com/security/advisories/VMSA-2008-0013.html
- http://www.vmware.com/security/advisories/VMSA-2008-0017.html
- http://www.vupen.com/english/advisories/2008/1787/references
- http://www.vupen.com/english/advisories/2008/1788/references
- http://www.vupen.com/english/advisories/2008/1797/references
- http://www.vupen.com/english/advisories/2008/1800/references
- http://www.vupen.com/english/advisories/2008/1801/references
- http://www.vupen.com/english/advisories/2008/1836/references
- http://www.vupen.com/english/advisories/2008/1981/references
- http://www.vupen.com/english/advisories/2008/2361
- http://www.vupen.com/english/advisories/2008/2971
- http://www.vupen.com/english/advisories/2009/1612
- https://bugzilla.redhat.com/show_bug.cgi?id=447974
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414
- https://www.exploit-db.com/exploits/5790
- https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html
- https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html
- https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html
- http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html
- http://lists.ingate.com/pipermail/productinfo/2008/000021.html
- http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00000.html
- http://marc.info/?l=bugtraq&m=127730470825399&w=2
- http://marc.info/?l=bugtraq&m=127730470825399&w=2
- http://rhn.redhat.com/errata/RHSA-2008-0528.html
- http://secunia.com/advisories/30574
- http://secunia.com/advisories/30596
- http://secunia.com/advisories/30612
- http://secunia.com/advisories/30615
- http://secunia.com/advisories/30626
- http://secunia.com/advisories/30647
- http://secunia.com/advisories/30648
- http://secunia.com/advisories/30665
- http://secunia.com/advisories/30802
- http://secunia.com/advisories/31334
- http://secunia.com/advisories/31351
- http://secunia.com/advisories/31467
- http://secunia.com/advisories/31568
- http://secunia.com/advisories/32664
- http://secunia.com/advisories/33003
- http://secunia.com/advisories/35463
- http://security.gentoo.org/glsa/glsa-200808-02.xml
- http://securityreason.com/securityalert/3933
- http://sourceforge.net/forum/forum.php?forum_id=833770
- http://sourceforge.net/tracker/index.php?func=detail&aid=1989089&group_id=12694&atid=456380
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-238865-1
- http://support.apple.com/kb/HT2163
- http://support.avaya.com/elmodocs2/security/ASA-2008-282.htm
- http://www.cisco.com/warp/public/707/cisco-sa-20080610-snmpv3.shtml
- http://www.debian.org/security/2008/dsa-1663
- http://www.kb.cert.org/vuls/id/878044
- http://www.kb.cert.org/vuls/id/CTAR-7FBS8Q
- http://www.kb.cert.org/vuls/id/MIMG-7ETS5Z
- http://www.kb.cert.org/vuls/id/MIMG-7ETS87
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A118
- http://www.ocert.org/advisories/ocert-2008-006.html
- http://www.openwall.com/lists/oss-security/2008/06/09/1
- http://www.redhat.com/support/errata/RHSA-2008-0529.html
- http://www.securityfocus.com/archive/1/493218/100/0/threaded
- http://www.securityfocus.com/archive/1/497962/100/0/threaded
- http://www.securityfocus.com/bid/29623
- http://www.securitytracker.com/id?1020218=
- http://www.ubuntu.com/usn/usn-685-1
- http://www.us-cert.gov/cas/techalerts/TA08-162A.html
- http://www.vmware.com/security/advisories/VMSA-2008-0013.html
- http://www.vmware.com/security/advisories/VMSA-2008-0017.html
- http://www.vupen.com/english/advisories/2008/1787/references
- http://www.vupen.com/english/advisories/2008/1788/references
- http://www.vupen.com/english/advisories/2008/1797/references
- http://www.vupen.com/english/advisories/2008/1800/references
- http://www.vupen.com/english/advisories/2008/1801/references
- http://www.vupen.com/english/advisories/2008/1836/references
- http://www.vupen.com/english/advisories/2008/1981/references
- http://www.vupen.com/english/advisories/2008/2361
- http://www.vupen.com/english/advisories/2008/2971
- http://www.vupen.com/english/advisories/2009/1612
- https://bugzilla.redhat.com/show_bug.cgi?id=447974
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10820
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5785
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6414
- https://www.exploit-db.com/exploits/5790
- https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00363.html
- https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00380.html
- https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00459.html



