On Sunday, June 30, 2002, at 03:50 PM, [EMAIL PROTECTED] wrote:

> The article at
>
> http://www.washingtonpost.com/wp-dyn/articles/A50765-2002Jun26.html
>
> seems to blame the ASN.1 specification language itself for the
> problem.  Can anyone say more about what they are discussiong ?

At a guess this relates to some exploits found in a lot of SNMP 
implementations as a result of some people constructing a test suite for 
the protocol. This was widely discussed at the time the vulnerabilities 
were published. See, for example:

    http://www.counterpane.com/crypto-gram-0203.html#1

and the readers comments in the following issue. The original advisory 
can be found at:

    http://www.ee.oulu.fi/research/ouspg/protos/testing/c06/snmpv1/

ASN.1 is no different to any other network protocol - it's possible 
write a buggy, exploitable implementation using it. There may be 
arguments for saying that the complexity of some of the encoding methods 
makes it difficult a safe implementation or that other aspects of the 
way people use ASN.1 can present risks but I don't recall anyone 
identifying anything in particular about ASN.1 itself.

Reply via email to