-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2015.2602
2015-10 Security Bulletin: Junos: Trio Chipset (Trinity) Denial of service
          due to maliciously crafted uBFD packet. (CVE-2015-7748)
                              15 October 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Juniper MX-Series
                   Juniper EX 9200
                   Juniper TXP with T-4000 Trio
                   Juniper T-4000
Publisher:         Juniper Networks
Operating System:  Juniper
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2015-7748  

Original Bulletin: 
   http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10701

- --------------------------BEGIN INCLUDED TEXT--------------------

2015-10 Security Bulletin: Junos: Trio Chipset (Trinity) Denial of service due
to maliciously crafted uBFD packet. (CVE-2015-7748)

Categories:

    TX Matrix Plus

    Junos

    Router Products

    MX-series

    TX Matrix

    Switch Products

    T4000

    EX9208

    EX9204

    EX9214

Security Advisories ID: JSA10701

Last Updated: 14 Oct 2015

Version: 2.0

Product Affected:

Any chassis with Trio (Trinity) chipset line cards: MX-Series, EX 9200, TXP 
with T-4000 Trio (Trinity) chipset line cards, T-4000.

Problem:

A remote attacker can cause a denial of service to the Trio Chipset (Trinity)
MPC due to maliciously crafted uBFD packets that are received directly, via 
VPN, MPLS, multicast, broadcast, on vt-interfaces, or otherwise.

This issue affects both IPv4 and IPv6 traffic in both ethernet, and 
non-ethernet physical environments, such as ATM, or SONET, where the crafted 
packet is received over physical interfaces.

If processed from a DPC through to the MPC then in-transit traffic will not be
susceptible.

In 6PE scenario, if the system is not using LSI/vt then not susceptible.

If processed via MPC line card will be affected, the MPC line card will crash.

If processed via endpoint receiving MPC line card terminating tunneling 
protocols such as MPLS/IPSec VPNs, etc. will be affected, this is considered 
in-transit traffic scenario.

This crash can happen when the crafted packet is directed directly to the lo0
interface IP/physical interface IP/broadcast IPv4 / IPv6 address of the 
Physical interface

This issue is assigned CVE-2015-7748.

Solution:

This issue does not apply to Junos OS 13.2 or lower.

The following software releases have been updated to resolve this specific 
issue: Junos OS 13.3R8, 14.1R6, 14.2R5, 15.1R2, 15.1F3, and all subsequent 
releases.

This issue is being tracked as PR 1102581 and is visible on the Customer 
Support website.

KB16765 - "In which releases are vulnerabilities fixed?" describes which 
release vulnerabilities are fixed as per our End of Engineering and End of 
Life support policies.

Workaround:

A workaround to apply a control plane (lo0) filter to drop uBFD packets in a 
layered defense approach may be implemented.


For IPv4 packets the following filter may be applied to lo0 interfaces:

family inet {
     filter ubfd {
         term 1 {
             from {
                 protocol udp;
                 destination-port 6784;
             }
             then {
                 discard;
             }
         }
         term 2 {
             then accept;
         }
     }
}

For IPv6 packets the following filter may be applied to lo0 interfaces:

family inet6 {
     filter ufbd-v6 {
         term 1 {
             from {
                 next-header udp;
                 destination-port 6784;
             }
             then {
                 count ufdb-v6;
                 discard;
             }
         }
         term 2 {
             then accept;
         }
     }
}

For IPv4 packets the following filter may be applied to lo0 interfaces:

Implementation:

How to obtain fixed software:

Security vulnerabilities in Junos are fixed in the next available Maintenance
Release of each supported Junos version. In some cases, a Maintenance Release
is not planned to be available in an appropriate time-frame. For these cases,
Service Releases are made available in order to be more timely. Security 
Advisory and Security Notices will indicate which Maintenance and Service 
Releases contain fixes for the issues described. Upon request to JTAC, 
customers will be provided download instructions for a Service Release. 
Although Juniper does not provide formal Release Note documentation for a 
Service Release, a list of "PRs fixed" can be provided on request.

Modification History:

2015-10-14: Initial publication

Related Links:

    KB16613: Overview of the Juniper Networks SIRT Quarterly Security Bulletin
Publication Process

    KB16765: In which releases are vulnerabilities fixed?

    KB16446: Common Vulnerability Scoring System (CVSS) and Juniper's Security
Advisories

    Report a Vulnerability - How to Contact the Juniper Networks Security 
Incident Response Team

    A mapping between chipset type and PFE module

    CVE-2015-7748: Trio Chipset (Trinity) Denial of service due to maliciously
crafted uBFD packet.

CVSS Score: 5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

Risk Level: Medium

Risk Assessment: Information for how Juniper Networks uses CVSS can be found 
at KB16446 "Common Vulnerability Scoring System (CVSS) and Juniper's Security
Advisories"

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBVh81336ZAP0PgtI9AQI6qBAArKDA+ntocjHI08YcjdTdF9wliCIRvtdI
hVGpc5lHPcTFajaGygiCsznkX3RzA8UJpn/AoFPqd6/0b6UNX/CA97Dg47LKlaHk
k5EAjmVqfa9I35LFEPrxcDZtm12pUdEqprz7VuUXyWo1PLDYcJfILaDqRQQRxcnq
wTGLn3JOHrzWl3QLpPP9dznlqxyLZdCNuUaj7kJZ72YJqQzqHUjonM5YOe7DtDMb
M8XC0UANbdp+EHUp9zwgLDsnsY31KIvzCg0yJD/O3ECer8iWWCSufFPJjMoASHxf
Mm9Iqjj8+IHJv9TM3fwcvL1vzoXEatie/pl7vgyS1G1AINHRmcXxY7y+LPDRzfbZ
oXwtiy3+JlqT+plwwXo3RJrdoRw7Kj5QtQA8idmpXQNsUwuLxAzBxLtCfp4vdL9j
Nsv6Qr1gcNLMzeb3r76bICAnMSsYeEeq9wYbdsb4jglCB2SzKNIMU+WvCNAxGim9
YK6tcvQseQSalsk0iXxECWhhxKpsoBfyyyg/I7rn+hI89KbJyerHb8pAFZO/t1+a
tu+HmSZec80RD+kPTwMzmZlEuD8jrFZ/m8yACnfurY4hZS4JFasLDF9EZhHxdD2Y
XvTVA5tByIX4R7ZMcUkVDcdwOh/Yc41Ac9EfoY+hezcSkBzBovgOIo8gKAFVJYZh
N9nWf6Tm9sc=
=O3im
-----END PGP SIGNATURE-----