-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.1857
         2014-10 Out of Cycle Security Bulletin: Multiple products
          affected by SSL "POODLE" vulnerability (CVE-2014-3566)
                              16 October 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Junos OS
                   Connect Secure (SA / SSL VPN) / Policy Secure (IC / UAC), MAG Series
                   ScreenOS
                   Junos Space
Publisher:         Juniper Networks
Operating System:  Juniper
Impact/Access:     Access Confidential Data -- Remote with User Interaction
                   Reduced Security         -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-3566  

Reference:         ASB-2014.0122
                   ESB-2014.1849

Original Bulletin: 
   http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10656

- --------------------------BEGIN INCLUDED TEXT--------------------

2014-10 Out of Cycle Security Bulletin: Multiple products affected by SSL 
"POODLE" vulnerability (CVE-2014-3566)

Categories:

    Junos

    Router Products

    Security Products

    Switch Products

    SSL_VPN_(IVE_OS)

    ScreenOS

    SIRT Advisory

Security Advisories ID: JSA10656

Last Updated: 15 Oct 2014

Version: 2.0

Product Affected:

Various products. Please see the list in the Problem section below.

Problem:

The SSL protocol 3.0 uses nondeterministic CBC padding, which makes it easier
for man-in-the-middle attackers to obtain cleartext data via a padding-oracle
attack. This issue is also known as the "POODLE" vulnerability.

SSL v3 is an older security protocol with known issues, but still exists as a
fallback protocol on many devices.

Vulnerable Products

    Junos OS

    Connect Secure (SA / SSL VPN) / Policy Secure (IC / UAC), MAG Series

    ScreenOS

    Junos Space

Juniper is investigating our product portfolio for affected software that is 
not mentioned above. As new information becomes available this document will 
be updated.

This issue has been assigned CVE-2014-3566.

Solution:

Junos:

Junos OS will include an update to OpenSSL in a future release.

Connect Secure (SA / SSL VPN) / Policy Secure (IC / UAC), MAG Series:

Please refer to Pulse Secure TSB16540 for details on mitigating risk from this
vulnerability.

ScreenOS:

A problem report has been submitted. Development is in the process of 
evaluating the best method to resolve this issue.

Junos Space:

Disable SSLv3 by changing the following files.

/etc/httpd/conf.d/webProxy.conf

/etc/httpd/conf.d/ssl.conf

/etc/httpd/conf.d/webConf/webProxyCertAuth.conf

The following line needs to be updated to remove references to SSLv3:

Original:

SSLProtocol -ALL +SSLv3 +TLSv1

Updated:

SSLProtocol -ALL +TLSv1

Restart httpd by typing 'service httpd restart'.

Workaround:

Junos:

Since SSL is used for remote network configuration and management applications
such as J-Web and SSL Service for JUNOScript (XNM-SSL), viable workarounds for
this issue in Junos may include:

    Disabling J-Web

    Disable SSL service for JUNOScript and only use Netconf, which makes use 
    of SSH, to make configuration changes

    Limit access to J-Web and XNM-SSL from only trusted networks

Implementation:

Modification History:

2014-10-15: Initial release

2014-10-15: Added CVSS score

Related Links:

    Google Blog: Exploiting the SSL 3.0 fallback

    TSB16540: Pulse Secure: Connect Secure (SA / SSL VPN) / Policy Secure (IC
    / UAC): How to disable SSLv3 to mitigate any potential risks from the 
    Poodle vulnerability

    KB16446: Common Vulnerability Scoring System (CVSS) and Juniper's Security
    Advisories

    Report a Vulnerability - How to Contact the Juniper Networks Security 
    Incident Response Team

    CVE-2014-3566: SSLv3 vulnerable to padding-oracle downgrade attack (aka. 
    "POODLE")

CVSS Score:

4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Risk Level:

Low

Risk Assessment:

Information for how Juniper Networks uses CVSS can be found at KB 16446 
"Common Vulnerability Scoring System (CVSS) and Juniper's Security 
Advisories."

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=4P3j
-----END PGP SIGNATURE-----