# # This script was written by Renaud Deraison # # Script audit and contributions from Carmichael Security # Erik Anderson # Added BugtraqID # # See the Nessus Scripts License for details # if(description) { script_id(10688); script_version ("$Revision$"); script_bugtraq_id(2427); name["english"] = "SNMP VACM"; script_name(english:name["english"]); desc["english"] = " This script attempts to obtain the remote private community strings using the View-Based Access Control MIB of the remote Cisco router. An attacker may use this flaw to gain read/write SNMP access on this router. Additional Info : http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml Risk factor : High"; script_description(english:desc["english"]); summary["english"] = "Enumerates communities via SNMP"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2001 Renaud Deraison"); family["english"] = "SNMP"; script_family(english:family["english"]); script_dependencies("snmp_default_communities.nasl"); script_require_keys("SNMP/community", "SNMP/port"); exit(0); } # # Solaris comes with a badly configured snmpd which # always reply with the same value. We make sure the answers # we receive are not in the list of default values usually # answered... # function valid_snmp_value(value) { if("/var/snmp/snmpdx.st" >< value)return(0); if("/etc/snmp/conf" >< value)return(0); return(1); } #--------------------------------------------------------------------# # Forges an SNMP GET NEXT packet # #--------------------------------------------------------------------# function get_next(community, id, object) { len = strlen(community); #display("len : ", len, "\n"); len = len % 256; tot_len = 4 + strlen(community) + 12 + strlen(object) + 4; # display(hex(tot_len), "\n"); _r = raw_string(0x30, tot_len, 0x02, 0x01, 0x00, 0x04, len); o_len = strlen(object) + 2; a_len = 13 + strlen(object); _r = _r + community + raw_string( 0xA1, a_len, 0x02, 0x01, id, 0x02, 0x01, 0x00, 0x02, 0x01, 0x00, 0x30,o_len) + object + raw_string(0x05, 0x00); # display("len : ", strlen(_r), "\n"); return(_r); } #---------------------------------------------------------------------# # Extracts the object from a reply # #---------------------------------------------------------------------# function extract_obj(data) { if(ord(data[2]) == 2) { cmty_len = ord(data[6]); off = 18 + cmty_len; } else { cmty_len = ord(data[7]); off = 20 + cmty_len; } len_payload = ord(data[off]); _obj = ""; total_len = ord(data[off+5])+6; for(i=4;ilen : ", _len, "\n"); _len = _len % 255; _obj2 = raw_string(0x30, _len); _obj = _obj2 + _obj; l = strlen(_obj); # for(i=0;i 0x00) && !(n == 0x5C)) _data = string(_data, raw_string(ord(data[off+i+1]))); } return(_data); } community = get_kb_item("SNMP/community"); if(!community)exit(0); comms = ""; port = get_kb_item("SNMP/port"); if(!port) port = 161; soc = open_sock_udp(port); first = raw_string(0x30, 0x82, 0x00, 0x0E, 0x06, 0x0A, 0x2b, 0x06, 0x01, 0x06, 0x03, 0x10, 0x01, 0x02, 0x01, 0x03); id = 2; req = get_next(id:id, community:community, object:first); send(socket:soc, data:req); r = recv(socket:soc, length:1025); if(strlen(r) < 48)exit(0); nxt = extract_obj(data:r); data = extract_data(data:r); #display(data, "\n"); if(strlen(data)) { if(valid_snmp_value(value:data)) { comms = string(comms, ". ", data, "\n"); } } for(z=1;z<255;z=z+1) { req = get_next(id:id+z, community:community, object:nxt); send(socket:soc, data:req); r = recv(socket:soc, length:1025); min = 45 + strlen(community); if(strlen(r) < min) { z = 256; } else { nxt = extract_obj(data:r); data = extract_data(data:r); if(strlen(data)) { #display(data, "\n"); if(valid_snmp_value(value:data)) comms = string(comms, ". ", data, "\n"); } } } if(strlen(comms)) { report = string( "It was possible to obtain the list of SNMP communities of the\n", "remote host via SNMP : \n\n", comms, "\n", "An attacker may use this information to gain r/w access on the\n", "remote router.\n", "Solution : disable the SNMP service on the remote host if you do not\n", " use it, or filter incoming UDP packets going to this port\n", "See http://www.cisco.com/warp/public/707/ios-snmp-community-vulns-pub.shtml\n", "Risk factor : High"); security_hole(protocol:"udp", port:port, data:report); }