Korean
<< Back
VID 20050
Severity 30
Port 161
Protocol UDP
Class SNMP
Detailed Description Active UDP ports is detected via SNMP. The active port may represent an incoming or outgoing session, or may simply be a service that is listening. A remote attacker can use this information to compromise the affected network resource.

* Platforms Affected:
All Platforms running SNMP service
Recommendation 1. If SNMP is not needed in your environment, consider disabling SNMP service completely.
- Solaris 10, Solaris 11:
# svcadm disable svc:/application/management/snmpdx
- Enterprise Linux 6.4, CentOS 6.4, Fedora 19:
# /etc/init.d/snmpd stop
# rpm -e (snmp name)

2. Filter all SNMP traffic (ports 161 and 162 UDP) from untrusted hosts.

3. Change default community strings
Most SNMP-enabled products ship with default community strings of "public" for read-only access and "private" for read-write access. Recommend that network administrators change these community strings to something of their own choosing.

4. Contact your vendor for patch and upgrade information. CERT Advisory CA-2002-03 includes details about the vulnerabilities and updates for many SNMP vendors. This document is available at http://www.cert.org/advisories/CA-2002-03.html
Related URL CVE-1999-0615 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)