News

SNMP Buffer Overrun Affects Windows

Microsoft Corp. on Tuesday advised users of its Windows server and client operating systems to disable the SNMP service if it is running because of a buffer overrun vulnerability in the industry-standard protocol.

Microsoft's Security Bulletin (MS02-006) accompanied a larger security advisory from the CERT/CC detailing how the SNMP vulnerability impacted operating systems, applications and hardware from dozens of vendors.

SNMP or Simple Network Management Protocol is for managing network devices, so the vulnerability affects computers, firewalls, routers and other products. A buffer overrun present in all implementations, can allow an attacker to cause denial of service or run code in LocalSystem context.

The SNMP service is disabled by default in all versions of Windows from Windows 95 and Windows NT up through Windows XP and Windows 2000 Server. Windows ME does not provide an SNMP implementation.

"A patch is under development to eliminate the vulnerability," Microsoft's security bulletin notes. "In the meantime, Microsoft recommends that customers who use the SNMP service disable it temporarily. Patches will be available shortly."

Microsoft classifies the SNMP vulnerability as a low risk on affected Internet servers, a moderate risk on affected intranet servers and a moderate risk on affected client systems.

Instructions for disabling the service are provided in the bulletin.

About the Author

Scott Bekker is editor in chief of Redmond Channel Partner magazine.

Featured

  • Azure Edge Zones Hit Preview

    Azure Edge Zones, a new edge computing technology from Microsoft designed to enable new scenarios for developers and partners, emerged as a preview release this week.

  • Microsoft Shifts 2020 Events To Be Online Only

    Microsoft is shifting its big events this year to be online only, including Ignite 2020.

  • Microsoft Browser Support for TLS 1.0 and 1.1 Ending 2H 2020

    Microsoft announced on Tuesday that its plans to drop support for Transport Layer Security (TLS) protocols 1.0 and 1.1 in its browsers will get delayed by a few months until the second half of this year.

  • Attackers Using Excel Read-Only Files To Obscure Malware

    Attackers can attempt to hide malicious payloads in Excel files sent by e-mail by using a standard Excel feature, according to a Tuesday post by Mimecast researchers.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.