-----Original Message-----
From: Glenn Waters [mailto:gww@nortelnetworks.com]
Sent: Wednesday, February 27, 2002 7:05 AM
To: rap@ops.ietf.org
Cc: Durham, David
Subject: RE: COPS vs. SNMPDave, the CERT advisory is purely about SNMP implementations and it not in any way about the design of the SNMP protocol.
The types of implementation problems that have been identified are pretty much all buffer overflow problems. When a buffer overflow occurs the box will typically exhibit some bad behavior -- like crash. This is known as a denial of service attack. Some smart hackers have even put assembled byte code in the overflowed buffer in an attempt to get that code to execute. In this case, the hacker could possibly take control of the box.
If you remember your Internet history, many years ago the SMTP protocol was used to compromise a system. This also made the news big time. I would characterize the SMTP protocol encoding to be even simpler than COPS-PR; to which I conclude that COPS-PR is just as vulnerable as ANY other protocol. Try the following goggle search and you see what I mean by the word ANY in the previous sentence:
http://www.google.com/search?hl=en&q=buffer+overflow
/gww