ID
VAR-E-200002-0024
EDB ID
19751
TITLE
Ascom COLTSOHO / Brocade Fabric OS / MatchBox / Win98/NT4 / Solaris / Xyplex - SNMP World Writeable Community - Multiple remote Exploit
Trust: 0.6
DESCRIPTION
Ascom COLTSOHO / Brocade Fabric OS / MatchBox / Win98/NT4 / Solaris / Xyplex - SNMP World Writeable Community. CVE-92015CVE-92014CVE-92013CVE-92012CVE-92011CVE-92010 . remote exploit for Multiple platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | ascom | model: | coltsoho brocade fabric os matchbox win98/nt4 solaris xyplex | scope: | eq | version: | ///// | Trust: 1.6 |
vendor: | xyplex | model: | router | scope: | eq | version: | 6.1.1 | Trust: 0.3 |
vendor: | sun | model: | solaris | scope: | eq | version: | 2.6 | Trust: 0.3 |
vendor: | microsoft | model: | windows nt | scope: | eq | version: | 4.0 | Trust: 0.3 |
vendor: | microsoft | model: | windows | scope: | eq | version: | 98 | Trust: 0.3 |
vendor: | cray | model: | matchbox router | scope: | eq | version: | 2.0.1 | Trust: 0.3 |
vendor: | cisco | model: | ios | scope: | eq | version: | 11.2 | Trust: 0.3 |
vendor: | brocade | model: | fabric os | scope: | eq | version: | 2.1.2 | Trust: 0.3 |
vendor: | ascom | model: | coltsoho | scope: | eq | version: | 2.0.21 | Trust: 0.3 |
vendor: | sun | model: | solaris | scope: | ne | version: | 7.0 | Trust: 0.3 |
vendor: | microsoft | model: | windows nt sp4 | scope: | ne | version: | 4.0 | Trust: 0.3 |
EXPLOIT
Ascom COLTSOHO 2.0.21,Brocade Fabric OS 2.1.2,Cisco IOS 11.2,Cray MatchBox Router 2.0.1,Windows 98,Windows NT 4.0,Solaris 2.6,Xyplex Router 6.1.1 SNMP World Writeable Community Vulnerability
source: https://www.securityfocus.com/bid/986/info
In a number of network devices/operating systems, some default communites are world-writeable and therefore allow remote users to configure properties of the device/OS without any authorization (other than knowledge of the community name).
Some of the common default communities/vendors are:
public (ascend,cisco,bay networks (nortel),microsoft,sun,3com, aix)
private (cisco,bay networks (nortel),microsoft,3com, brocade, aix, netapp)
write (ascend, very common)
"all private" (sun)
monitor (3com)
manager (3com)
security (3com)
OrigEquipMfr (brocade)
"Secret C0de" (brocade)
admin
default
password
tivoli
openview
community
snmp
snmpd
system (aix, others)
the name of the router (ie, 'gate')
The attacks can include manipulating routing tables and corrupting ARP caches, which can lead to further compromise. This type of vulnerability has been seen for quite some time; more information on it is listed in the credit section.
snmpset hostname {private|public} interfaces.ifTable.ifEntry.ifAdminStatus.1 i 2
This will make the primary interface on the target host (with a default community of public or private) change state to two, which is "down".
Trust: 1.0
EXPLOIT LANGUAGE
txt
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
SNMP World Writeable Community
Trust: 1.6
CREDITS
Michal Zalewski
Trust: 0.6
EXTERNAL IDS
db: | BID | id: | 986 | Trust: 2.5 |
db: | EXPLOIT-DB | id: | 19751 | Trust: 1.6 |
db: | EDBNET | id: | 70188 | Trust: 0.6 |
db: | EDBNET | id: | 41943 | Trust: 0.6 |
REFERENCES
url: | https://www.securityfocus.com/bid/986/info | Trust: 1.0 |
url: | https://www.intelligentexploit.com | Trust: 0.6 |
url: | https://www.exploit-db.com/exploits/19751/ | Trust: 0.6 |
url: | http://www.phrack.com/issues.html?issue=50&id=7#article | Trust: 0.3 |
SOURCES
db: | BID | id: | 986 |
db: | EXPLOIT-DB | id: | 19751 |
db: | EDBNET | id: | 70188 |
db: | EDBNET | id: | 41943 |
LAST UPDATE DATE
2022-07-27T09:51:19.209000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 986 | date: | 2008-04-16T00:29:00 |
SOURCES RELEASE DATE
db: | BID | id: | 986 | date: | 2000-02-15T00:00:00 |
db: | EXPLOIT-DB | id: | 19751 | date: | 2000-02-15T00:00:00 |
db: | EDBNET | id: | 70188 | date: | 2008-10-25T00:00:00 |
db: | EDBNET | id: | 41943 | date: | 2000-02-15T00:00:00 |