ID

VAR-E-200002-0024


EDB ID

19751


TITLE

Ascom COLTSOHO / Brocade Fabric OS / MatchBox / Win98/NT4 / Solaris / Xyplex - SNMP World Writeable Community - Multiple remote Exploit

Trust: 0.6

sources: EXPLOIT-DB: 19751

DESCRIPTION

Ascom COLTSOHO / Brocade Fabric OS / MatchBox / Win98/NT4 / Solaris / Xyplex - SNMP World Writeable Community. CVE-92015CVE-92014CVE-92013CVE-92012CVE-92011CVE-92010 . remote exploit for Multiple platform

Trust: 0.6

sources: EXPLOIT-DB: 19751

AFFECTED PRODUCTS

vendor:ascommodel:coltsoho brocade fabric os matchbox win98/nt4 solaris xyplexscope:eqversion://///

Trust: 1.6

vendor:xyplexmodel:routerscope:eqversion:6.1.1

Trust: 0.3

vendor:sunmodel:solarisscope:eqversion:2.6

Trust: 0.3

vendor:microsoftmodel:windows ntscope:eqversion:4.0

Trust: 0.3

vendor:microsoftmodel:windowsscope:eqversion:98

Trust: 0.3

vendor:craymodel:matchbox routerscope:eqversion:2.0.1

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:11.2

Trust: 0.3

vendor:brocademodel:fabric osscope:eqversion:2.1.2

Trust: 0.3

vendor:ascommodel:coltsohoscope:eqversion:2.0.21

Trust: 0.3

vendor:sunmodel:solarisscope:neversion:7.0

Trust: 0.3

vendor:microsoftmodel:windows nt sp4scope:neversion:4.0

Trust: 0.3

sources: BID: 986 // EXPLOIT-DB: 19751 // EDBNET: 41943

EXPLOIT

Ascom COLTSOHO 2.0.21,Brocade Fabric OS 2.1.2,Cisco IOS 11.2,Cray MatchBox Router 2.0.1,Windows 98,Windows NT 4.0,Solaris 2.6,Xyplex Router 6.1.1 SNMP World Writeable Community Vulnerability

source: https://www.securityfocus.com/bid/986/info

In a number of network devices/operating systems, some default communites are world-writeable and therefore allow remote users to configure properties of the device/OS without any authorization (other than knowledge of the community name).

Some of the common default communities/vendors are:

public (ascend,cisco,bay networks (nortel),microsoft,sun,3com, aix)
private (cisco,bay networks (nortel),microsoft,3com, brocade, aix, netapp)
write (ascend, very common)
"all private" (sun)
monitor (3com)
manager (3com)
security (3com)
OrigEquipMfr (brocade)
"Secret C0de" (brocade)
admin
default
password
tivoli
openview
community
snmp
snmpd
system (aix, others)
the name of the router (ie, 'gate')

The attacks can include manipulating routing tables and corrupting ARP caches, which can lead to further compromise. This type of vulnerability has been seen for quite some time; more information on it is listed in the credit section.

snmpset hostname {private|public} interfaces.ifTable.ifEntry.ifAdminStatus.1 i 2

This will make the primary interface on the target host (with a default community of public or private) change state to two, which is "down".

Trust: 1.0

sources: EXPLOIT-DB: 19751

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 19751

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 19751

TYPE

SNMP World Writeable Community

Trust: 1.6

sources: EXPLOIT-DB: 19751 // EDBNET: 41943

CREDITS

Michal Zalewski

Trust: 0.6

sources: EXPLOIT-DB: 19751

EXTERNAL IDS

db:BIDid:986

Trust: 2.5

db:EXPLOIT-DBid:19751

Trust: 1.6

db:EDBNETid:70188

Trust: 0.6

db:EDBNETid:41943

Trust: 0.6

sources: BID: 986 // EXPLOIT-DB: 19751 // EDBNET: 70188 // EDBNET: 41943

REFERENCES

url:https://www.securityfocus.com/bid/986/info

Trust: 1.0

url:https://www.intelligentexploit.com

Trust: 0.6

url:https://www.exploit-db.com/exploits/19751/

Trust: 0.6

url:http://www.phrack.com/issues.html?issue=50&id=7#article

Trust: 0.3

sources: BID: 986 // EXPLOIT-DB: 19751 // EDBNET: 70188 // EDBNET: 41943

SOURCES

db:BIDid:986
db:EXPLOIT-DBid:19751
db:EDBNETid:70188
db:EDBNETid:41943

LAST UPDATE DATE

2022-07-27T09:51:19.209000+00:00


SOURCES UPDATE DATE

db:BIDid:986date:2008-04-16T00:29:00

SOURCES RELEASE DATE

db:BIDid:986date:2000-02-15T00:00:00
db:EXPLOIT-DBid:19751date:2000-02-15T00:00:00
db:EDBNETid:70188date:2008-10-25T00:00:00
db:EDBNETid:41943date:2000-02-15T00:00:00