-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2013.1651
       2013-11 Security Bulletin: Junos Space: MySQL security update
                             15 November 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Junos Space
                   JA1500 Junos Space Appliance
Publisher:         Juniper Networks
Operating System:  Juniper
                   VMware ESX Server
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Modify Arbitrary Files          -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2013-3801 CVE-2013-1492 CVE-2013-0385
                   CVE-2012-3163 CVE-2012-3158 CVE-2012-3147
                   CVE-2012-1702 CVE-2012-0882 CVE-2012-0553
                   CVE-2012-0486 CVE-2011-2262 

Reference:         ASB-2013.0086
                   ASB-2013.0007
                   ASB-2012.0143
                   ASB-2012.0009
                   ESB-2013.0138
                   ESB-2012.1133
                   ESB-2012.1087
                   ESB-2012.0252
                   ESB-2012.0146

Original Bulletin: 
   https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10601

- --------------------------BEGIN INCLUDED TEXT--------------------

2013-11 Security Bulletin: Junos Space: MySQL security update

Categories:

Junos Space

SIRT Advisory

Security Advisories ID:

JSA10601

Last Updated:

13 Nov 2013

Version:

1.0

Product Affected:

Junos Space and JA1500 Junos Space Appliance with Junos Space releases before
13.1R1.

Problem:

MySQL server software included with Junos Space is affected by a number of 
security vulnerabilities. The following may pose a security risk to Junos 
Space:

CVE 		CVSSv2 Base Score and Vector Summary

CVE-2011-2262 	5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P) Denial of Service 
		Vulnerability in MySQL

CVE-2012-0486 	5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P) Denial of Service 
		Vulnerability in MySQL

CVE-2012-0553 	7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) Buffer overflow in yaSSL as 
		used in MySQL

CVE-2012-0882 	7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) Buffer overflow in yaSSL as 
		used in MySQL

CVE-2012-1702 	5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P) Denial of Service 
		Vulnerability in MySQL

CVE-2012-3147 	6.4 (AV:N/AC:L/Au:N/C:N/I:P/A:P) Vulnerability in MySQL with 
		impact on integrity and availability.

CVE-2012-3158 	7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) Vulnerability in MySQL with 
		impact on confidentiality, integrity and availability.

CVE-2012-3163 	9.0 (AV:N/AC:L/Au:S/C:C/I:C/A:C) Vulnerability in MySQL with 
		impact on Junos Space's confidentiality, integrity and 
		availability.

CVE-2013-0385 	6.6 (AV:L/AC:L/Au:N/C:C/I:C/A:N) Vulnerability in MySQL with 
		impact on Junos Space system confidentiality and integrity.

CVE-2013-1492 	7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) Buffer overflow in yaSSL as 
		used in MySQL

CVE-2013-3801 	5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P) Denial of Service Vulnerability
		in MySQL

A firewall is enabled by default on Junos Space which limits access to the 
MySQL server port to only permitted hosts or Junos Space nodes. If the 
firewall is disabled for any reason, the MySQL server port is exposed, which 
increases the risks posed by the above vulnerabilities.

Solution:

The above listed vulnerabilities are resolved in Junos Space 13.1R1 and later
releases.

MySQL server software has been upgraded to 5.5.30 in Junos Space 13.1R1.Junos
Space releases can be obtained from:

http://www.juniper.net/support/downloads/?p=space

Workaround:

Enable firewall on Junos Space or limit access to Junos Space only from 
trusted hosts.

Implementation:

Junos Space releases can be obtained from:

http://www.juniper.net/support/downloads/?p=space

Related Links:

    KB16613: Overview of the Juniper Networks SIRT Monthly Security Bulletin 
Publication Process

    KB16765: In which releases are vulnerabilities fixed?

    KB16446: Common Vulnerability Scoring System (CVSS) and Juniper's Security
Advisories

CVSS Score:

9.0 (AV:N/AC:L/Au:S/C:C/I:C/A:C)

Risk Level:

High

Risk Assessment:

CVSS score is based on CVE-2012-3163.

Acknowledgements:

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=1EKf
-----END PGP SIGNATURE-----