Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2015.2690 2015-10 Out of Cycle Security Bulletin: NTP.org announcement of multiple vulnerabilities. 26 October 2015 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: NTP Publisher: Juniper Networks Operating System: Juniper Impact/Access: Access Privileged Data -- Remote/Unauthenticated Denial of Service -- Remote/Unauthenticated Provide Misleading Information -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2015-7871 CVE-2015-7855 CVE-2015-7854 CVE-2015-7853 CVE-2015-7852 CVE-2015-7851 CVE-2015-7850 CVE-2015-7849 CVE-2015-7848 CVE-2015-7705 CVE-2015-7704 CVE-2015-7703 CVE-2015-7702 CVE-2015-7701 CVE-2015-7692 CVE-2015-7691 Reference: ESB-2015.2667 Original Bulletin: http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10711 - --------------------------BEGIN INCLUDED TEXT-------------------- 2015-10 Out of Cycle Security Bulletin: NTP.org announcement of multiple vulnerabilities. Categories: Junos Router Products J-series M-series T-series MX-series Security Products Switch Products EX Series SRX Series Security Advisories ID: JSA10711 Last Updated: 23 Oct 2015 Version: 2.0 Product Affected: This issue can affect any product or platform running NTP.org's NTP daemon. Problem: NTP.org published a security advisory for thirteen vulnerabilities in NTP software on Oct 21st, 2015. These vulnerabilities may allow remote unauthenticated attackers to cause Denial(s) of Service(s), disruption of service(s) by modification of time stamps being issued by the NTP server from malicious NTP crafted packets, including maliciously crafted NTP authentication packets and disclosure of information. This can impact DNS services, as well as certificate chains, such as those used in SSL/https communications and allow attackers to maliciously inject invalid certificates as valid which clients would accept as valid. Junos OS NTP is not enabled in Junos by default. When NTP is enabled within the [edit system ntp] hierarchy level of the Junos configuration Junos OS may be impacted by these vulnerabilities. If unwanted NTP requests come into a Junos device, the NTP process may process these requests as valid NTP incoming packets. On the SRX Series platform, NTP requests coming in from security zones to the firewall self-traffic are dropped by default unless the 'host-inbound-traffic' for 'protocol ntp' is explicitly enabled. These issues have been assigned CVE-2015-7871 CVE-2015-7855 CVE-2015-7854 CVE-2015-7853 CVE-2015-7852 CVE-2015-7851 CVE-2015-7850 CVE-2015-7849 CVE-2015-7848 CVE-2015-7701 CVE-2015-7703 CVE-2015-7704 CVE-2015-7705 CVE-2015-7691 CVE-2015-7692 CVE-2015-7702. Solution: These issues are being tracked as PR 1132181 for Junos OS. KB16765 - "In which releases are vulnerabilities fixed?" describes which release vulnerabilities are fixed as per our End of Engineering and End of Life support policies. Additional platforms and products are still being reviewed. This section will be updated as additional fixes for the vulnerabilities are available. Workaround: Juniper has published JSA10613 and JSA10663 previously to mitigate attacks and exploits against NTP. To mitigate risk of NTP exploits, customers should read and follow the workaround sections of these JSA's. To mitigate these exploits: Authenticate with only trusted higher-stratum servers e.g. if your stratum is 10, authenticate to only trusted stratum 0 - 9 servers. Limit the attack surface by implementing firewall filters to only accept NTP authentication messages from trusted servers. Some evidence exists that retrieval of time services from Non-NTP.org NTP-based servers may mitigate these currently-disclosed risks, but is not guaranteed. If your NTP server is a high level stratum; e.g. stratum 0 or 1; open NTP server, no known workarounds exists. Customers are urged to apply the updates as they become available and follow the Solution section. Implementation: How to obtain fixed software: Security vulnerabilities in Junos are fixed in the next available Maintenance Release of each supported Junos version. In some cases, a Maintenance Release is not planned to be available in an appropriate time-frame. For these cases, Service Releases are made available in order to be more timely. Security Advisory and Security Notices will indicate which Maintenance and Service Releases contain fixes for the issues described. Upon request to JTAC, customers will be provided download instructions for a Service Release. Although Juniper does not provide formal Release Note documentation for a Service Release, a list of "PRs fixed" can be provided on request. Modification History: 2015-10-23: Initial publication Related Links: KB16765: In which releases are vulnerabilities fixed? KB16446: Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories Report a Vulnerability - How to Contact the Juniper Networks Security Incident Response Team NTP.ORG October 2015 NTP Security Vulnerability Announcement (Medium) CVE-2015-7871 NAK to the Future: Symmetric association authentication bypass via crypto-NAK (Cisco ASIG) CVE-2015-7855 decodenetnum() will ASSERT botch instead of returning FAIL on some bogus values (IDA) CVE-2015-7854 Password Length Memory Corruption Vulnerability. (Cisco TALOS) CVE-2015-7853 Invalid length data provided by a custom refclock driver could cause a buffer overflow. (Cisco TALOS) CVE-2015-7852 ntpq atoascii() Memory Corruption Vulnerability. (Cisco TALOS) CVE-2015-7851 saveconfig Directory Traversal Vulnerability. (OpenVMS) (Cisco TALOS) CVSS Score: 7.2 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L) Risk Level: High Risk Assessment: Information for how Juniper Networks uses CVSS can be found at KB16446 "Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories" - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVi2RiH6ZAP0PgtI9AQJSlhAAqR2ILARvhvCGElbiEA7j9ueV6htU+lFx wYQOVE5BZ3FWAObs2v+vZl0qNXl3bto+3FY8ZfzvhSU9TzMG2Osec99HW7F1THee zcvR3IFw0scP3HFdBBZEwWptnwc/a2qgc9YVZvEj8Po/x4izDwoaOslynJnNI5Ak ynL7yfR+rjw8AGSMrsMOoszLRzAAmjRGd/2sOgRMWx8WYXoD+ueNi9qpNLbAX/Am dKFY5bjsao4ZYN1yWmpO6ibEXjGPWb7gpefBGYTWm0bDgm4TmJNkSr0lrhP3jwq1 r20smJ3SnuMNuSDtupjqDj85DSGYcZlb5g6D33OV6/5ksmg9k1umRLIZSdu68MxJ mDPpZQyhgcr9cvG4ldiFjUPD33jyV7wrwyBZUBrh442KRPdQQR09EZSy73gHs3Nl tu3vz/jFPeXZ92dH6tabwojjTxH/zSk7+Y27gQd2CKtoJPmAAsqEEUzQnG2OSbGG VlC+VHM9zu7BaTdSWMAVDyrFNv+zuQQTvQznVFjQDGpzZ1Tt/KDdZEuET/O48KMW qocM4d4a64OzYw5RRjy4IxtvASPXYKW4ii/WIcIuKgiBYY0V6aHa75rq5jhLtVep jE06OUD09N9h3KrsWgJYbak6eFGVnRu7FKJuDudZZtuVkQgnSxvHmhv4bLqio9tG Z36BH433bMw= =YTbx -----END PGP SIGNATURE-----