Feeds

The SNMP fiasco: steps you need to take

Relax, you can beat the clock

  • alert
  • submit to reddit

New hybrid storage solutions

First off, we received a bulletin from Counterpane, a company which monitors SNMP on its clients' machines, saying that the vulnerability does not appear to have been exploited yet. So basically, you're playing 'beat the clock' with the blackhat community, and chances are that if you act soon, you'll win.

Second, this is a developing story to which we haven't got any final answers and for which our recommendations are both preliminary and incomplete, being cobbled together from numerous bulletins and a bit of homebrew tinkering.

Our inbox has been filling steadily with advisories, so we will update this item periodically as developments warrant. If you don't find the information you're looking for below, check back later.

Pros

Obviously, your quickest and surest fix is going to be disabling SNMP if you don't have to run it. Indeed, disabling unnecessary network services is a normal part of system hygeine, so this is a good opportunity to take the time and do a thorough job of it.

If you're stuck with it, then you can filter ports 7/udp 161/udp 161/tcp 162/udp 162/tcp 199/udp 199/tcp 391/udp 391/tcp 705/tcp 1993/udp and 1993/tcp. Obviously, if you need to keep any of these open you'll leave a vulnerability, but by shutting off the ones you don't need you'll make it easier to monitor for suspicious activity.

Meanwhile, check with your vendor for specific advice and patch availability relevant to your router/switch/hub/server/OS/etc. All the vendors are currently working on patches, and it may be only a matter of hours before yours makes one available if it hasn't yet. The most comprehensive single source of general information and workaround suggestions is the CERT Advisory.

Home users

It's unlikely that you've got this service enabled without knowing it, but not impossible. The very vulnerable SNMPv1 is shipped with Windows 9X, NT and 2K, but is not enabled by default. Win-ME has no such service, but it could have been carried over during an upgrade from 9X. Win-XP uses a later version which is also vulnerable.

Linux home users also may have it enabled without realizing it, especially if they've done default server installations which they've never got around to using. Bust open a shell and enter the command ps ax | more to see everything running on your system, and look for snmpd and/or gxsnmp. If you find it running, and have no reason to believe it ought to be running, you can very quickly chmod the executable.

Of course you can re-configure your system or your firewall, but this is the quick-and-dirty way: kill the process using the process id (under 'pid') with the command kill 'process id'. Now note the path to the executable, and enter the command chmod 0 /'dir'/'subdir'/'executable.file'.

You can simply run chmod 1 on the file when your Linux distributor releases a patch, or leave it if you have no use for the service. (I did try this on my own machine and it didn't break anything, though that's no guarrantee that someone else won't run into a snag. Still, it ought to be harmless on simple home-user installations.)

For Windows users, the procedure depends on your version:

Win-9X users can go to Control Panel/Network, and look for Microsoft SNMP Agent. If you find it, remove it.

You can also check the following registry keys
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
and ensure that snmp.exe is removed from the lists.

For NT, go to Control Panel/Services, and look for SNMP. If you find it, select it and click Stop; then go to Startup and click Disabled.

For 2K and XP, right click My Computer and go to Manage/Services and then Applications/Services, and look for SNMP. If you find it, select it and click Stop. Go to Startup, and click Disabled.

Microsoft says a patch is in the works. Obviously all the Linux distributors are working on patches as well. At this writing, Red Hat has already released theirs, which are available as RPMs from ftp://updates.redhat.com. ®

The next step in data security

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.