Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2015.2602 2015-10 Security Bulletin: Junos: Trio Chipset (Trinity) Denial of service due to maliciously crafted uBFD packet. (CVE-2015-7748) 15 October 2015 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Juniper MX-Series Juniper EX 9200 Juniper TXP with T-4000 Trio Juniper T-4000 Publisher: Juniper Networks Operating System: Juniper Impact/Access: Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2015-7748 Original Bulletin: http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10701 - --------------------------BEGIN INCLUDED TEXT-------------------- 2015-10 Security Bulletin: Junos: Trio Chipset (Trinity) Denial of service due to maliciously crafted uBFD packet. (CVE-2015-7748) Categories: TX Matrix Plus Junos Router Products MX-series TX Matrix Switch Products T4000 EX9208 EX9204 EX9214 Security Advisories ID: JSA10701 Last Updated: 14 Oct 2015 Version: 2.0 Product Affected: Any chassis with Trio (Trinity) chipset line cards: MX-Series, EX 9200, TXP with T-4000 Trio (Trinity) chipset line cards, T-4000. Problem: A remote attacker can cause a denial of service to the Trio Chipset (Trinity) MPC due to maliciously crafted uBFD packets that are received directly, via VPN, MPLS, multicast, broadcast, on vt-interfaces, or otherwise. This issue affects both IPv4 and IPv6 traffic in both ethernet, and non-ethernet physical environments, such as ATM, or SONET, where the crafted packet is received over physical interfaces. If processed from a DPC through to the MPC then in-transit traffic will not be susceptible. In 6PE scenario, if the system is not using LSI/vt then not susceptible. If processed via MPC line card will be affected, the MPC line card will crash. If processed via endpoint receiving MPC line card terminating tunneling protocols such as MPLS/IPSec VPNs, etc. will be affected, this is considered in-transit traffic scenario. This crash can happen when the crafted packet is directed directly to the lo0 interface IP/physical interface IP/broadcast IPv4 / IPv6 address of the Physical interface This issue is assigned CVE-2015-7748. Solution: This issue does not apply to Junos OS 13.2 or lower. The following software releases have been updated to resolve this specific issue: Junos OS 13.3R8, 14.1R6, 14.2R5, 15.1R2, 15.1F3, and all subsequent releases. This issue is being tracked as PR 1102581 and is visible on the Customer Support website. KB16765 - "In which releases are vulnerabilities fixed?" describes which release vulnerabilities are fixed as per our End of Engineering and End of Life support policies. Workaround: A workaround to apply a control plane (lo0) filter to drop uBFD packets in a layered defense approach may be implemented. For IPv4 packets the following filter may be applied to lo0 interfaces: family inet { filter ubfd { term 1 { from { protocol udp; destination-port 6784; } then { discard; } } term 2 { then accept; } } } For IPv6 packets the following filter may be applied to lo0 interfaces: family inet6 { filter ufbd-v6 { term 1 { from { next-header udp; destination-port 6784; } then { count ufdb-v6; discard; } } term 2 { then accept; } } } For IPv4 packets the following filter may be applied to lo0 interfaces: Implementation: How to obtain fixed software: Security vulnerabilities in Junos are fixed in the next available Maintenance Release of each supported Junos version. In some cases, a Maintenance Release is not planned to be available in an appropriate time-frame. For these cases, Service Releases are made available in order to be more timely. Security Advisory and Security Notices will indicate which Maintenance and Service Releases contain fixes for the issues described. Upon request to JTAC, customers will be provided download instructions for a Service Release. Although Juniper does not provide formal Release Note documentation for a Service Release, a list of "PRs fixed" can be provided on request. Modification History: 2015-10-14: Initial publication Related Links: KB16613: Overview of the Juniper Networks SIRT Quarterly Security Bulletin Publication Process KB16765: In which releases are vulnerabilities fixed? KB16446: Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories Report a Vulnerability - How to Contact the Juniper Networks Security Incident Response Team A mapping between chipset type and PFE module CVE-2015-7748: Trio Chipset (Trinity) Denial of service due to maliciously crafted uBFD packet. CVSS Score: 5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) Risk Level: Medium Risk Assessment: Information for how Juniper Networks uses CVSS can be found at KB16446 "Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories" - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVh81336ZAP0PgtI9AQI6qBAArKDA+ntocjHI08YcjdTdF9wliCIRvtdI hVGpc5lHPcTFajaGygiCsznkX3RzA8UJpn/AoFPqd6/0b6UNX/CA97Dg47LKlaHk k5EAjmVqfa9I35LFEPrxcDZtm12pUdEqprz7VuUXyWo1PLDYcJfILaDqRQQRxcnq wTGLn3JOHrzWl3QLpPP9dznlqxyLZdCNuUaj7kJZ72YJqQzqHUjonM5YOe7DtDMb M8XC0UANbdp+EHUp9zwgLDsnsY31KIvzCg0yJD/O3ECer8iWWCSufFPJjMoASHxf Mm9Iqjj8+IHJv9TM3fwcvL1vzoXEatie/pl7vgyS1G1AINHRmcXxY7y+LPDRzfbZ oXwtiy3+JlqT+plwwXo3RJrdoRw7Kj5QtQA8idmpXQNsUwuLxAzBxLtCfp4vdL9j Nsv6Qr1gcNLMzeb3r76bICAnMSsYeEeq9wYbdsb4jglCB2SzKNIMU+WvCNAxGim9 YK6tcvQseQSalsk0iXxECWhhxKpsoBfyyyg/I7rn+hI89KbJyerHb8pAFZO/t1+a tu+HmSZec80RD+kPTwMzmZlEuD8jrFZ/m8yACnfurY4hZS4JFasLDF9EZhHxdD2Y XvTVA5tByIX4R7ZMcUkVDcdwOh/Yc41Ac9EfoY+hezcSkBzBovgOIo8gKAFVJYZh N9nWf6Tm9sc= =O3im -----END PGP SIGNATURE-----