Riverstone Networks Information for VU#107186

Multiple vulnerabilities in SNMPv1 trap handling



Vendor Statement

      The Riverstone product line is, under certain circumstances,
      vulnerable tosome of the SNMP issues described in CERT's VU#854306 (advisory
      CA-2002-03). Based on current testing the assessment is that the risk to an
      operational network is low. Patch releases and will correct these

      Please, implement the following workarounds until these patches are made

         - create access control lists to allow only trusted management stations
           to access the router.
         - create an exclusive management VLAN to manage the router.
         - manage the router through its ethernet management interface.
         - disable SNMP

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References



The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.