NT Patch Available for SNMP Vulnerability
- By Scott Bekker
Microsoft Corp. continues to work on bringing out patches for all versions of Windows affected by the industry-wide security vulnerability in SNMP.
Microsoft alerted subscribers to its Security Bulletin service Wednesday night that an SNMP patch was available for Windows NT 4.0 users.
Microsoft issued a patch for Windows 2000 and Windows XP users a few days after the security organization, CERT/CC, issued a broad alert in mid-February detailing threats to numerous operating systems, software and hardware spanning the industry.
Microsoft immediately posted a security bulletin last month that included a workaround for users who have turned on the SNMP service. Users who install patches now available for Windows NT, Windows 2000 and Windows XP won't need to use the workaround.
Microsoft's SNMP service is not installed or running by default in any operating system.
Patches for Windows 95, Windows 98 and Windows 98 Second Edition are under development. Windows ME did not include an implementation of the SNMP service.
SNMP or Simple Network Management Protocol is for managing network devices, so the vulnerability affects computers, firewalls, routers and other products. A buffer overrun present in all implementations, can allow an attacker to cause denial of service or run code in LocalSystem context.
Microsoft classifies the SNMP vulnerability as a low risk on affected Internet servers, a moderate risk on affected intranet servers and a moderate risk on affected client systems.
The security bulletin and patches can be accessed here:
Scott Bekker is editor in chief of Redmond Channel Partner magazine.