A
:
-
PPENDIX B
CC
SG AND NETWORK CONFIGURATION
Security and Open Port Scans
As part of the CC-SG Quality Assurance process, several open port scanners are applied to the
product and Raritan Computer makes certain that its product is not vulnerable to these known
attacks. All the open or filtered/blocked ports are listed in the above sections. Some of the more
common exposures are:
3
Issue ID
Synopsis
CVE-1999-0517
snmp (161/UDP) - the community
name of the remote SNMP server can
CVE-1999-0186
be guessed.
CVE-1999-0254
CVE-1999-0516
CVE-2000-0843 The remote telnet server shut the
connection abruptly when given a
long username followed by a
password.
CVE-2004-0230 The remote host might be vulnerable
to a sequence number approximation
bug, which may allow an attacker to
send spoofed RST packets to the
remote host and close established
connections.
CVE-2004-0079
The remote host is using a version of
OpenSSL which is older than 0.9.6m
CVE-2004-0081
or 0.9.7d.
CVE-2004-0112
3
CVEs can be found on http://cve.mitre.org.
Comment
Default CC-SG SNMP community name is
"public". Users are encouraged to change this
to the site-specific value (Setup
Configuration Manager
Please refer to the CC-SG Administrator
Guide for more additional information.
Traditionally, port 23 is used for telnet services.
However, CC-SG uses this port for SSH V2
Diagnostic Console sessions. Users may change
the port and/or completely disable Diagnostic
Console from using the SSH Access method.
Please refer to the CC-SG Administrator
Guide for more additional information.
The underlying TCP/IP protocol stack used by
CC-SG has not been shown to be susceptible to
this exposure.
The following patches have been applied to
OpenSSL, therefore removing this exposure:
• RHSA-2004:120
• RHSA-2005:830.
• RHSA-2003:101-01
235
SNMP menu).
Need help?
Do you have a question about the Command Center CC-SG and is the answer not in the manual?
Questions and answers