Radware Information for VU#107186
Multiple vulnerabilities in SNMPv1 trap handling
- Vendor Information Help Date Notified:
- Statement Date:
- Date Updated: 22 Mar 2002
Radware has assessed its SNMP based products against the vulnerabilities identified in CERT Advisory CA-2002-03. The following table identifies by product the currently available software maintenance releases that include the fix for the SNMP vulnerabilities:
For upgrades to a new feature release, e.g. WSD 7.10.07 to WSD 7.21.02, a software password is needed and can be obtained by contacting Radware technical support at firstname.lastname@example.org. The unit must be covered by an active support agreement to obtain a password for a feature release upgrade. Additional requirements, e.g. minimum Boot ROM software version, may exist. Software upgrade instructions can be found at the following link:email@example.com for assistance.
At all times, Radware recommends taking the following standard security precautions:
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.