-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2015.2690
       2015-10 Out of Cycle Security Bulletin: NTP.org announcement
                       of multiple vulnerabilities.
                              26 October 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           NTP
Publisher:         Juniper Networks
Operating System:  Juniper
Impact/Access:     Access Privileged Data         -- Remote/Unauthenticated
                   Denial of Service              -- Remote/Unauthenticated
                   Provide Misleading Information -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2015-7871 CVE-2015-7855 CVE-2015-7854
                   CVE-2015-7853 CVE-2015-7852 CVE-2015-7851
                   CVE-2015-7850 CVE-2015-7849 CVE-2015-7848
                   CVE-2015-7705 CVE-2015-7704 CVE-2015-7703
                   CVE-2015-7702 CVE-2015-7701 CVE-2015-7692
                   CVE-2015-7691  

Reference:         ESB-2015.2667

Original Bulletin: 
   http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10711

- --------------------------BEGIN INCLUDED TEXT--------------------

2015-10 Out of Cycle Security Bulletin: NTP.org announcement of multiple 
vulnerabilities.

Categories:

    Junos

    Router Products

    J-series

    M-series

    T-series

    MX-series

    Security Products

    Switch Products

    EX Series

    SRX Series

Security Advisories ID: JSA10711

Last Updated: 23 Oct 2015

Version: 2.0

Product Affected:

This issue can affect any product or platform running NTP.org's NTP daemon.

Problem:

NTP.org published a security advisory for thirteen vulnerabilities in NTP 
software on Oct 21st, 2015. These vulnerabilities may allow remote 
unauthenticated attackers to cause Denial(s) of Service(s), disruption of 
service(s) by modification of time stamps being issued by the NTP server from
malicious NTP crafted packets, including maliciously crafted NTP 
authentication packets and disclosure of information. This can impact DNS 
services, as well as certificate chains, such as those used in SSL/https 
communications and allow attackers to maliciously inject invalid certificates
as valid which clients would accept as valid.

Junos OS

NTP is not enabled in Junos by default. When NTP is enabled within the [edit 
system ntp] hierarchy level of the Junos configuration Junos OS may be 
impacted by these vulnerabilities.

If unwanted NTP requests come into a Junos device, the NTP process may process
these requests as valid NTP incoming packets.

On the SRX Series platform, NTP requests coming in from security zones to the
firewall self-traffic are dropped by default unless the 'host-inbound-traffic'
for 'protocol ntp' is explicitly enabled.

These issues have been assigned CVE-2015-7871 CVE-2015-7855 CVE-2015-7854 
CVE-2015-7853 CVE-2015-7852 CVE-2015-7851 CVE-2015-7850 CVE-2015-7849 
CVE-2015-7848 CVE-2015-7701 CVE-2015-7703 CVE-2015-7704 CVE-2015-7705 
CVE-2015-7691 CVE-2015-7692 CVE-2015-7702.

Solution:

These issues are being tracked as PR 1132181 for Junos OS.

KB16765 - "In which releases are vulnerabilities fixed?" describes which 
release vulnerabilities are fixed as per our End of Engineering and End of 
Life support policies.

Additional platforms and products are still being reviewed.

This section will be updated as additional fixes for the vulnerabilities are 
available.

Workaround:

Juniper has published JSA10613 and JSA10663 previously to mitigate attacks and
exploits against NTP. To mitigate risk of NTP exploits, customers should read
and follow the workaround sections of these JSA's.

To mitigate these exploits:

    Authenticate with only trusted higher-stratum servers e.g. if your stratum
    is 10, authenticate to only trusted stratum 0 - 9 servers.

    Limit the attack surface by implementing firewall filters to only accept 
    NTP authentication messages from trusted servers.

    Some evidence exists that retrieval of time services from Non-NTP.org 
    NTP-based servers may mitigate these currently-disclosed risks, but is not 
    guaranteed.

If your NTP server is a high level stratum; e.g. stratum 0 or 1; open NTP 
server, no known workarounds exists.

Customers are urged to apply the updates as they become available and follow 
the Solution section.

Implementation:

How to obtain fixed software:

Security vulnerabilities in Junos are fixed in the next available Maintenance
Release of each supported Junos version. In some cases, a Maintenance Release
is not planned to be available in an appropriate time-frame. For these cases,
Service Releases are made available in order to be more timely. Security 
Advisory and Security Notices will indicate which Maintenance and Service 
Releases contain fixes for the issues described. Upon request to JTAC, 
customers will be provided download instructions for a Service Release. 
Although Juniper does not provide formal Release Note documentation for a 
Service Release, a list of "PRs fixed" can be provided on request.

Modification History:

2015-10-23: Initial publication

Related Links:

    KB16765: In which releases are vulnerabilities fixed?

    KB16446: Common Vulnerability Scoring System (CVSS) and Juniper's Security
    Advisories

    Report a Vulnerability - How to Contact the Juniper Networks Security 
    Incident Response Team

    NTP.ORG October 2015 NTP Security Vulnerability Announcement (Medium)

    CVE-2015-7871 NAK to the Future: Symmetric association authentication 
    bypass via crypto-NAK (Cisco ASIG)

    CVE-2015-7855 decodenetnum() will ASSERT botch instead of returning FAIL 
    on some bogus values (IDA)

    CVE-2015-7854 Password Length Memory Corruption Vulnerability. (Cisco 
    TALOS)

    CVE-2015-7853 Invalid length data provided by a custom refclock driver 
    could cause a buffer overflow. (Cisco TALOS)

    CVE-2015-7852 ntpq atoascii() Memory Corruption Vulnerability. (Cisco 
    TALOS)

    CVE-2015-7851 saveconfig Directory Traversal Vulnerability. (OpenVMS) 
    (Cisco TALOS)

CVSS Score: 7.2 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L)

Risk Level: High

Risk Assessment: Information for how Juniper Networks uses CVSS can be found 
at KB16446 "Common Vulnerability Scoring System (CVSS) and Juniper's Security
Advisories"

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBVi2RiH6ZAP0PgtI9AQJSlhAAqR2ILARvhvCGElbiEA7j9ueV6htU+lFx
wYQOVE5BZ3FWAObs2v+vZl0qNXl3bto+3FY8ZfzvhSU9TzMG2Osec99HW7F1THee
zcvR3IFw0scP3HFdBBZEwWptnwc/a2qgc9YVZvEj8Po/x4izDwoaOslynJnNI5Ak
ynL7yfR+rjw8AGSMrsMOoszLRzAAmjRGd/2sOgRMWx8WYXoD+ueNi9qpNLbAX/Am
dKFY5bjsao4ZYN1yWmpO6ibEXjGPWb7gpefBGYTWm0bDgm4TmJNkSr0lrhP3jwq1
r20smJ3SnuMNuSDtupjqDj85DSGYcZlb5g6D33OV6/5ksmg9k1umRLIZSdu68MxJ
mDPpZQyhgcr9cvG4ldiFjUPD33jyV7wrwyBZUBrh442KRPdQQR09EZSy73gHs3Nl
tu3vz/jFPeXZ92dH6tabwojjTxH/zSk7+Y27gQd2CKtoJPmAAsqEEUzQnG2OSbGG
VlC+VHM9zu7BaTdSWMAVDyrFNv+zuQQTvQznVFjQDGpzZ1Tt/KDdZEuET/O48KMW
qocM4d4a64OzYw5RRjy4IxtvASPXYKW4ii/WIcIuKgiBYY0V6aHa75rq5jhLtVep
jE06OUD09N9h3KrsWgJYbak6eFGVnRu7FKJuDudZZtuVkQgnSxvHmhv4bLqio9tG
Z36BH433bMw=
=YTbx
-----END PGP SIGNATURE-----