__________________________________________________________
	
						   The U.S. Department of Energy
					   Computer Incident Advisory Capability
							   ___  __ __    _     ___
							  /       |     /_\   /
							  \___  __|__  /   \  \___
				 __________________________________________________________
	
								 INFORMATION BULLETIN
	
							 Vulnerability in SNMP (926247)
						[Microsoft Security Bulletin (MS06-074)]
	
	December 13, 2006 13:00 GMT                                       Number R-073
	[REVISED 21 Dec 2006]
	______________________________________________________________________________
	PROBLEM:       A remote code execution vulnerability exists in SNMP Service. 
	PLATFORM:      Tested Software and Security Update Download Locations: 
				   Affected Software: 
				   • Microsoft Windows 2000 Service Pack 4 
				   • Microsoft Windows XP Service Pack 2 
				   • Microsoft Windows XP Professional x64 Edition 
				   • Microsoft Windows Server 2003 and Microsoft Windows Server 
					   2003 Service Pack 1 
				   • Microsoft Windows Server 2003 for Itanium-based Systems and 
					   Microsoft Windows Server 2003 with SP1 for Itanium-based 
					   Systems 
				   • Microsoft Windows Server 2003 x64 Edition 
				   Non-Affected Software: 
				   • Windows Vista 
				   Storage Management Appliance I, II, III
	DAMAGE:        A remote intruder who could access the SNMP port on a system 
				   could take complete control of the system. The SNMP Service is 
				   not enabled by default. 
	SOLUTION:      Upgrade to the appropriate version. 
	______________________________________________________________________________
	VULNERABILITY  The risk is HIGH. A remote intruder who could access the SNMP 
	ASSESSMENT:    port on a system could take complete control of the system. The 
				   SNMP Service is not enabled by default. 
	______________________________________________________________________________
	LINKS: 
	 CIAC BULLETIN:      http://www.ciac.org/ciac/bulletins/r-073.shtml 
	 ORIGINAL BULLETIN:  Microsoft Security Bulletin MS06-074 (926247)                                                         
						 http://www.microsoft.com/technet/security/Bulletin/
								  MS06-074.mspx 
	 ADDITIONAL LINK:    Visit Hewlett-Packard's Subscription Service for:
                         HPSBST02180 SSRT061288 rev. 1
	 CVE:                http://www.cve.mitre.org/cgi-bin/cvename.cgi?name= 
						 CVE-2006-5583 
	______________________________________________________________________________
	REVISION HISTORY:
	12/21/2006 - revised to add a link to Hewlett-Packard HPSBST02180 SSRT061288
                 rev. 1 for Storage Management Appliance v2.1 Software running on 
				 Storage Management Appliance I, II, III.
				 
				 
				 
	[***** Start Microsoft Security Bulletin (MS06-074) *****]
	
	Microsoft Security Bulletin MS06-074
	Vulnerability in SNMP Could Allow Remote Code Execution (926247)
	Published: December 12, 2006
	
	Version: 1.0
	
	Summary
	Who Should Read this Document: Customers who use Microsoft Windows
	
	Impact of Vulnerability: Remote Code Execution
	
	Maximum Severity Rating: Important
	
	Recommendation: Customers should apply the update at the earliest opportunity
	
	Security Update Replacement: None
	
	Caveats: None
	
	Tested Software and Security Update Download Locations:
	
	Affected Software: 
	
	• Microsoft Windows 2000 Service Pack 4 — Download the update
	 
	• Microsoft Windows XP Service Pack 2 — Download the update
	 
	• Microsoft Windows XP Professional x64 Edition — Download the update
	 
	• Microsoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1 
	  — Download the update
	 
	• Microsoft Windows Server 2003 for Itanium-based Systems and Microsoft Windows 
	  Server 2003 with SP1 for Itanium-based Systems — Download the update
	 
	• Microsoft Windows Server 2003 x64 Edition — Download the update
	 
	
	Non-Affected Software:
	
	• Windows Vista
	 
	
	The software in this list has been tested to determine whether the versions are 
	affected. Other versions either no longer include security update support or may 
	not be affected. To determine the support life cycle for your product and version, 
	visit the Microsoft Support Lifecycle Web site.
	
	Top of section
	General Information
	 Executive Summary 
	
	Executive Summary:
	
	This update resolves a newly discovered, privately reported, vulnerability. The 
	vulnerability is documented in the "Vulnerability Details" section of this bulletin.
	
	An attacker who successfully exploited this vulnerability could take complete 
	control of an affected system. An attacker could then install programs; view, 
	change, or delete data; or create new accounts with full user rights.
	
	We recommend that customers apply the update at the earliest opportunity.
	
	Severity Ratings and Vulnerability Identifiers:
	
	Vulnerability Identifiers Impact of Vulnerability Windows 2000 Service Pack 4 Windows 
	XP Service Pack 2 Windows Server 2003 Windows Server 2003 Service Pack 1 
	SNMP Memory Corruption Vulnerability - CVE-2006-5583
	 Remote Code Execution
	
	 Important
	 Important
	
	 Important
	
	 Important
	
	 
	
	This assessment is based on the types of systems that are affected by the 
	vulnerability, their typical deployment patterns, and the effect that exploiting 
	the vulnerability would have on them.
	
	Note The severity ratings for non-x86 operating system versions map to the x86 
	operating systems versions as follows:
	
	• The Windows XP Professional x64 Edition severity rating is the same as the Windows 
	XP Service Pack 2 severity rating.
	 
	• The Windows Server 2003 for Itanium-based Systems severity rating is the same as 
	the Windows Server 2003 severity rating.
	 
	• The Windows Server 2003 with Service Pack 1 for Itanium-based Systems severity 
	rating is the same as the Windows Server 2003 Service Pack 1 severity rating.
	 
	• The Windows Server 2003 x64 Edition severity rating is the same as the Windows 
	Server 2003 Service Pack 1 severity rating.
	 
	
	Top of section
	 Vulnerability Details 
	
	 SNMP Memory Corruption Vulnerability - CVE-2006-5583: 
	
	A remote code execution vulnerability exists in SNMP Service that could allow an 
	attacker who successfully exploited this vulnerability to take complete control 
	of the affected system.
	
	 Mitigating Factors for SNMP Memory Corruption Vulnerability - CVE-2006-5583: 
	
	• SNMP service is not installed by default in any supported version of Windows.
	 
	• For customers who require the affected component, firewall best practices and 
	  standard default firewall configurations can help protect networks from attacks 
	  that originate outside the enterprise perimeter. Best practices recommend that 
	  systems that are connected to the Internet have a minimal number of ports 
	  exposed.
	 
	
	Top of section
	 Workarounds for SNMP Memory Corruption Vulnerability - CVE-2006-5583: 
	
	Microsoft has tested the following workarounds. Although these workarounds will 
	not correct the underlying vulnerability, they help block known attack vectors. 
	When a workaround reduces functionality, it is identified in the following section.
	
	• Restrict the IP addresses that are allowed to manage the computer. 
	
	1. Click Start, and then click Run.
	 
	2. In the Open box, type services.msc and then click OK.
	 
	3. Click SNMP Service and select Properties.
	 
	4. Click the Security tab and select Accept SNMP packets from these hosts.
	 
	5. Add the approved management station's IP address by clicking Add, typing in the 
	 IP address or host name, and clicking Add.
	 
	 
	• Block the following at the firewall:
	
	• UDP port 161
	 
	
	This port is used to initiate a connection with the affected component. Blocking it 
	at the firewall will help protect systems that are behind that firewall from attempts 
	to exploit this vulnerability. Also, make sure that you block any other specifically 
	configured SNMP port on the remote system. We recommend that you block all 
	unsolicited inbound communication from the Internet to help prevent attacks that may 
	use other ports.
	 
	• To help protect from network-based attempts to exploit this vulnerability, use a 
	personal firewall, such as the Windows Firewall, which is included with Windows XP.
	
	By default, the Windows Firewall feature in Windows XP helps protect your Internet 
	connection by blocking unsolicited incoming traffic. We recommend that you block all 
	unsolicited incoming communication from the Internet.
	
	To enable the Windows Firewall feature by using the Network Setup Wizard, follow these 
	steps:
	
	• Click Start, and then click Control Panel.
	 
	• Double-click Network Connections and then click Change Windows Firewall settings.
	 
	• On the General tab, ensure that the On (recommended) value is selected. This will 
	enable the Windows Firewall.
	 
	• Once the Windows Firewall is enabled, select Don’t allow exceptions to prohibit all 
	incoming traffic.
	 
	
	If you want to enable certain programs and services to communicate through the firewall, 
	de-select Don’t allow exceptions and click the Exceptions tab. On the Exceptions tab, 
	select the programs, protocols, and services you want to enable.
	 
	• To help protect from network-based attempts to exploit this vulnerability, block the 
	affected ports by using IPSec on the affected systems.
	
	Use Internet Protocol security (IPSec) to help protect network communications. Detailed 
	information about IPSec and about how to apply filters is available in Microsoft 
	Knowledge Base Article 313190 and Microsoft Knowledge Base Article 813878.
	 
	• Disable the SNMP service
	
	Disabling the SNMP service will help protect the affected system from attempts to 
	exploit this vulnerability. To disable the SNMP service, follow these steps:
	
	1. Click Start, and then click Control Panel. Alternatively, point to Settings, and 
	   then click Control Panel.
	 
	2. Double-click Administrative Tools.
	 
	3. Double-click Services.
	 
	4. Double-click SNMP Service.
	 
	5. In the Startup type list, click Disabled.
	 
	6. Click Stop, and then click OK.
	 
	
	You can also stop and disable the SNMP service by using the following command at the 
	command prompt:
	
	sc stop SNMP & sc config SNMP start= disabled
	
	 
	• Impact of Workaround: If you disable the SNMP service, you may not be able to monitor 
	systems via SNMP.
	 
	
	
	 Security Update Information 
	
	Affected Software:
	
	For information about the specific security update for your affected software, 
	click the appropriate link:
	
	 Windows 2000 (all versions) 
	 Windows XP 
	 Windows Server 2003 (all versions) 
	
	Top of section
	Acknowledgments
	
	Microsoft thanks the following for working with us to help protect customers:
	
	• Kostya Kortchinsky of Immunity, Inc. and Clement Seguy of the European 
	  Aeronautic Defence and Space Company for reporting the SNMP Memory Corruption 
	  Vulnerability (CVE-2006-5583).
	 
	
	Obtaining Other Security Updates:
	
	Updates for other security issues are available at the following locations:
	
	• Security updates are available at the Microsoft Download Center. You can find 
	  them most easily by doing a keyword search for "security_patch."
	 
	• Updates for consumer platforms are available at the Microsoft Update Web site.
	 
	
	Support: 
	
	• Customers in the U.S. and Canada can receive technical support from Microsoft 
	  Product Support Services at 1-866-PCSAFETY. There is no charge for support 
	  calls that are associated with security updates.
	 
	• International customers can receive support from their local Microsoft 
	  subsidiaries. There is no charge for support that is associated with security 
	  updates. For more information about how to contact Microsoft for support issues, 
	  visit the International Support Web site.
	 
	
	Security Resources: 
	
	• The Microsoft TechNet Security Web site provides additional information about 
	  security in Microsoft products.
	 
	• TechNet Update Management Center
	 
	• Microsoft Software Update Services
	 
	• Microsoft Windows Server Update Services
	 
	• Microsoft Baseline Security Analyzer (MBSA)
	 
	• Windows Update
	 
	• Microsoft Update
	 
	• Windows Update Catalog: For more information about the Windows Update Catalog, 
	  see Microsoft Knowledge Base Article 323166.
	 
	• Office Update 
	 
	
	Software Update Services:
	
	By using Microsoft Software Update Services (SUS), administrators can quickly and 
	reliably deploy the latest critical updates and security updates to Windows 2000 
	and Windows Server 2003-based servers, and to desktop systems that are running 
	Windows 2000 Professional or Windows XP Professional.
	
	For more information about how to deploy security updates by using Software Update 
	Services, visit the Software Update Services Web site.
	
	Windows Server Update Services:
	
	By using Windows Server Update Services (WSUS), administrators can quickly and 
	reliably deploy the latest critical updates and security updates for Windows 2000 
	operating systems and later, Office XP and later, Exchange Server 2003, and SQL 
	Server 2000 onto Windows 2000 and later operating systems.
	
	For more information about how to deploy security updates using Windows Server 
	Update Services, visit the Windows Server Update Services Web site.
	
	Systems Management Server:
	
	Microsoft Systems Management Server (SMS) delivers a highly configurable enterprise 
	solution for managing updates. By using SMS, administrators can identify Windows-
	based systems that require security updates and can perform controlled deployment 
	of these updates throughout the enterprise with minimal disruption to end users. 
	For more information about how administrators can use SMS 2003 to deploy security 
	updates, visit the SMS 2003 Security Patch Management Web site. SMS 2.0 users can 
	also use Software Updates Service Feature Pack to help deploy security updates. For 
	information about SMS, visit the SMS Web site.
	
	Note SMS uses the Microsoft Baseline Security Analyzer, the Microsoft Office 
	Detection Tool, and the Enterprise Update Scan Tool to provide broad support for 
	security bulletin update detection and deployment. Some software updates may not be 
	detected by these tools. Administrators can use the inventory capabilities of the 
	SMS in these cases to target updates to specific systems. For more information about 
	this procedure, visit the following Web site. Some security updates require 
	administrative rights following a restart of the system. Administrators can use the 
	Elevated Rights Deployment Tool (available in the SMS 2003 Administration Feature 
	Pack and in the SMS 2.0 Administration Feature Pack) to install these updates.
	
	Disclaimer: 
	
	The information provided in the Microsoft Knowledge Base is provided "as is" without 
	warranty of any kind. Microsoft disclaims all warranties, either express or implied, 
	including the warranties of merchantability and fitness for a particular purpose. In 
	no event shall Microsoft Corporation or its suppliers be liable for any damages 
	whatsoever including direct, indirect, incidental, consequential, loss of business 
	profits or special damages, even if Microsoft Corporation or its suppliers have been 
	advised of the possibility of such damages. Some states do not allow the exclusion or 
	limitation of liability for consequential or incidental damages so the foregoing 
	limitation may not apply.
	
	Revisions: 
	
	• V1.0 (December 12, 2006): Bulletin published.
	 
	
	
	[***** End Microsoft Security Bulletin (MS06-074) *****]
	_______________________________________________________________________________
	
	CIAC wishes to acknowledge the contributions of Microsoft for the 
	information contained in this bulletin.
	_______________________________________________________________________________
	
	
	CIAC, the Computer Incident Advisory Capability, is the computer
	security incident response team for the U.S. Department of Energy
	(DOE) and the emergency backup response team for the National
	Institutes of Health (NIH). CIAC is located at the Lawrence Livermore
	National Laboratory in Livermore, California. CIAC is also a founding
	member of FIRST, the Forum of Incident Response and Security Teams, a
	global organization established to foster cooperation and coordination
	among computer security teams worldwide.
	
	CIAC services are available to DOE, DOE contractors, and the NIH. CIAC
	can be contacted at:
		Voice:    +1 925-422-8193 (7x24)
		FAX:      +1 925-423-8002
		STU-III:  +1 925-423-2604
		E-mail:   ciac@ciac.org
	
	Previous CIAC notices, anti-virus software, and other information are
	available from the CIAC Computer Security Archive.
	
	   World Wide Web:      http://www.ciac.org/
	   Anonymous FTP:       ftp.ciac.org
	
	PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing
	communities receive CIAC bulletins.  If you are not part of these
	communities, please contact your agency's response team to report
	incidents. Your agency's team will coordinate with CIAC. The Forum of
	Incident Response and Security Teams (FIRST) is a world-wide
	organization. A list of FIRST member organizations and their
	constituencies can be obtained via WWW at http://www.first.org/.
	
	This document was prepared as an account of work sponsored by an
	agency of the United States Government. Neither the United States
	Government nor the University of California nor any of their
	employees, makes any warranty, express or implied, or assumes any
	legal liability or responsibility for the accuracy, completeness, or
	usefulness of any information, apparatus, product, or process
	disclosed, or represents that its use would not infringe privately
	owned rights. Reference herein to any specific commercial products,
	process, or service by trade name, trademark, manufacturer, or
	otherwise, does not necessarily constitute or imply its endorsement,
	recommendation or favoring by the United States Government or the
	University of California. The views and opinions of authors expressed
	herein do not necessarily state or reflect those of the United States
	Government or the University of California, and shall not be used for
	advertising or product endorsement purposes.
	
	LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC)
	
	R-063: Vulnerability in Microsoft Word
	R-064: GnuPG Security Update
	R-065: Google Mini and Google Search Appliance Vulnerable
	R-066: Adobe Download Manager Vulnerability
	R-067: l2tpns Buffer Overflow
	R-068: Microsoft Windows Media Player
	R-069: IBM Tivoli Storage Manager
	R-070: BrightStor ARCserve Backup
	R-071: Cisco Security Agent Management Center LDAP Administrator Authentication Bypass
	R-072: Security Vulnerabilities in Solaris ld.so.1(1)