{"vuid":"VU#878044","idnumber":"878044","name":"SNMPv3 improper HMAC validation allows authentication bypass","keywords":["Net-SNMP","UCD-SMNP","HMAC","SNMPv3"],"overview":"A vulnerability in the way implementations of SNMPv3 handle specially crafted packets may allow authentication bypass.","clean_desc":"SNMP can be configured to utilize version 3, which is the current standard version of SNMP. SNMPv3 incorporates security features such as authentication and privacy control among other features. Authentication for SNMPv3 is done using keyed-Hash Message Authentication Code (HMAC), a message authentication code calculated using a cryptographic hash function in combination with a secret key. Implementations of SNMPv3 may allow a shortened HMAC code in the authenticator field to authenticate to an agent or a trap daemon using a minimum HMAC of 1 byte. This issue is known to affect Net-SNMP and UCD-SNMP. Other SNMP implementations may also be affected.","impact":"This vulnerability allows attackers to read and modify any SNMP object that can be accessed by the impersonated user. Attackers exploiting this vulnerability can view and modify the configuration of these devices.","resolution":"Upgrade This vulnerability is addressed in Net-SNMP versions 5.4.1.1, 5.3.2.1, 5.2.4.1, 5.1.4.1, 5.0.11.1 and UCD-SNMP 4.2.7.1. Please see the Net-SNMP download page. Alternatively, consult your vendor. See the Systems Affected section below for more information. Apply a patch Net-SNMP has released a patch to address this issue. For more information refer to SECURITY RELEASE: Multple Net-SNMP Versions Released. Users are encouraged to apply the patch as soon as possible. Note that patch should apply cleanly to UCD-snmp too.","workarounds":"Enable the SNMPv3 privacy subsystem The configuration should be modified to enable the SNMPv3 privacy subsystem to encrypt the SNMPv3 traffic using a secret, private key. This option does not encrypt the HMAC, but does minimize the possible affects from this vulnerability.","sysaffected":"","thanks":"This issue was reported by Wes Hardaker at Net-SNMP. Thanks also to Jeff Case of \nSNMP Research\n and \noCERT","author":"This document was written by Chris Taschner and David Warren.","public":["http://sourceforge.net/forum/forum.php?forum_id=833770","http://www.ocert.org/advisories/ocert-2008-006.html","http://secunia.com/advisories/30574/","http://secunia.com/advisories/30665/","http://sunsolve.sun.com/search/document.do?assetkey=1-66-238865-1"],"cveids":["CVE-2008-0960"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2008-05-14T14:20:10Z","publicdate":"2008-05-31T00:00:00Z","datefirstpublished":"2008-06-10T13:59:27Z","dateupdated":"2009-07-16T18:00:24Z","revision":37,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"3","cam_exploitation":"0","cam_internetinfrastructure":"13","cam_population":"18","cam_impact":"10","cam_easeofexploitation":"14","cam_attackeraccessrequired":"10","cam_scorecurrent":"7.56","cam_scorecurrentwidelyknown":"15.5925","cam_scorecurrentwidelyknownexploited":"25.0425","ipprotocol":"","cvss_accessvector":"--","cvss_accesscomplexity":"--","cvss_authentication":null,"cvss_confidentialityimpact":"--","cvss_integrityimpact":"--","cvss_availabilityimpact":"--","cvss_exploitablity":null,"cvss_remediationlevel":"ND","cvss_reportconfidence":"ND","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"ND","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"0","cvss_basevector":"AV:--/AC:--/Au:--/C:--/I:--/A:--","cvss_temporalscore":"0","cvss_environmentalscore":"0","cvss_environmentalvector":"CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND","metric":7.56,"vulnote":null}