| VID |
20006 |
| Severity |
20 |
| Port |
161 |
| Protocol |
UDP |
| Class |
SNMP |
| Detailed Description |
It is possible to obtain the LANMAN services table of the host via SNMP. An attacker may use this information to gain more knowledge about the target host.
* References: http://www.securityspace.com/smysecure/catid.html?id=10547 |
| Recommendation |
1. If SNMP is not required, disable the service. - UNIX : Kill the snmp process found from the list of the processes and remove it from any RC scripts. - Solaris 10, Solaris 11: # svcadm disable svc:/application/management/snmpdx - Enterprise Linux 6.4, CentOS 6.4, Fedora 19: # /etc/init.d/snmpd stop # rpm -e (snmp name) - Windows : Stop the SNMP service and change Startup type to Disabled (Execute services.msc -> Services -> SNMP Service, In windows 2000, Administrative tools -> Services -> SNMP Service)
2. If you need SNMP for network management, make sure it is properly configured with private community names - Unix : Configure 'get-community-name' line in /etc/snmpd.conf - Router : Type 'show config' and make sure 'snmp-community' is properly configured - Windows : Configure the community name with private one (Execute services.msc -> Services -> SNMP Service -> 'Security' tab)
3. Filter incoming traffic to the 161/u¿¡ port |
| Related URL |
(CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|