MS02-006

Simple Network Management Protocol (SNMP) is an Internet standard protocol for managing disparate network devices such as firewalls, computers, and routers. All versions of Windows except Windows ME provide an SNMP implementation, which is neither installed nor running by default in any version.

A buffer overrun is present in all implementations. By sending a specially malformed management request to a system running an affected version of the SNMP service, an attacker could cause a denial of service. In addition, it is possible that he cause code to run on the system in LocalSystem context. This could potentially give the attacker the ability to take any desired action on the system.

A patch is under development to eliminate the vulnerability. In the meantime, Microsoft recommends that customers who use the SNMP service disable it temporarily. Patches will be available shortly, at which time Microsoft will re-release this bulletin with updated details.

Who should read this bulletin: System administrators who use Simple Network Management Protocol to manage Microsoft® Windows® 95, 98, 98SE, Windows NT® 4.0, Windows 2000 or Windows XP systems.

Impact of vulnerability: Denial of Service, potentially run code of attacker"s choice

Maximum Severity Rating: Moderate

Recommendation: Disable SNMP service if running; apply patch when available

Affected Software:

Microsoft Windows 95

Microsoft Windows 98

Microsoft Windows 98SE

Microsoft Windows NT 4.0

Microsoft Windows NT 4.0 Server, Terminal Server Edition

Microsoft Windows 2000

Microsoft Windows XP

View: Microsoft TechNet - Security Bulletin MS02-006

Report a problem with article
Next Article

Star Fox Adventures Trailer

Previous Article

Classic Gaming Expo 2002