TANDBERG Information for VU#107186

Multiple vulnerabilities in SNMPv1 trap handling

Status

Not Affected

Vendor Statement

Tandberg have run all the testcases found the PROTOS test-suite, c06snmpv1:

  1. c06-snmpv1-req-app-pr1.jar
  2. c06-snmpv1-req-enc-pr1.jar
  3. c06-snmpv1-trap-app-pr1.jar
  4. c06-snmpv1-trap-enc-pr1.jar
    The tests were run with standard delay time between the requests (100ms), but also with a delay of 1ms. The tests applies to all TANDBERG products (T500, T880, T1000, T2500, T6000 and T8000). The software tested on these products were B4.0 (our latest software) and no problems were found when running the test suite.

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Vendor References

    None

    Addendum

    The CERT/CC has no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.