-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.2404
  Multiple vulnerabilities have been identified in Juniper Junos products
                              13 October 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Junos J-Web
                   Junos
                   Junos Space
                   JUNOSe
Publisher:         Juniper Networks
Operating System:  Juniper
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated      
                   Increased Privileges            -- Remote/Unauthenticated      
                   Access Privileged Data          -- Remote/Unauthenticated      
                   Denial of Service               -- Remote/Unauthenticated      
                   Cross-site Request Forgery      -- Remote with User Interaction
                   Cross-site Scripting            -- Remote with User Interaction
                   Provide Misleading Information  -- Remote/Unauthenticated      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-4931 CVE-2016-4930 CVE-2016-4929
                   CVE-2016-4928 CVE-2016-4927 CVE-2016-4926
                   CVE-2016-4925 CVE-2016-4923 CVE-2016-4922
                   CVE-2016-4921  

Original Bulletin: 
   http://kb.juniper.net/index?page=content&id=JSA10764
   http://kb.juniper.net/index?page=content&id=JSA10762
   http://kb.juniper.net/index?page=content&id=JSA10763
   http://kb.juniper.net/index?page=content&id=JSA10760
   http://kb.juniper.net/index?page=content&id=JSA10767

Comment: This bulletin contains five (5) Juniper Networks security 
         advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

2016-10 Security Bulletin: Junos J-Web: Cross Site Scripting Vulnerability 
(CVE-2016-4923)

Product Affected:

This issue can affect any product or platform running Junos OS with J-Web 
enabled.

Problem:

Insufficient cross site scripting protection in J-Web may potentially allow a
remote unauthenticated user to inject web script or HTML and steal sensitive 
data and credentials from a J-Web session and to perform administrative 
actions on the Junos device.

Juniper SIRT is not aware of any malicious exploitation of this vulnerability.

This issue has been assigned CVE-2016-4923.

Solution:

The following software releases have been updated to resolve this specific 
issue: Junos OS 12.1X44-D60, 12.1X46-D40, 12.1X47-D30, 12.3R11, 12.3X48-D20, 
13.2X51-D39, 13.2X51-D40, 13.3R9, 14.1R6, 14.2R6, 15.1R3, 15.1X49-D20 and 
16.1R1 and all subsequent releases.

This issue is being tracked as PR 1085816 and is visible on the Customer 
Support website.

Workaround:

Access J-Web from trusted hosts which may not be compromised by cross-site 
scripting attacks, for example, deploying jump hosts with no internet access 
which use anti-scripting techniques to mitigate potential threats.

Implementation:

How to obtain fixed software:

Security vulnerabilities in Junos are fixed in the next available Maintenance
Release of each supported Junos version. In some cases, a Maintenance Release
is not planned to be available in an appropriate time-frame. For these cases,
Service Releases are made available in order to be more timely. Security 
Advisory and Security Notices will indicate which Maintenance and Service 
Releases contain fixes for the issues described. Upon request to JTAC, 
customers will be provided download instructions for a Service Release. 
Although Juniper does not provide formal Release Note documentation for a 
Service Release, a list of "PRs fixed" can be provided on request.

Modification History:

2016-10-12: Initial publication

Related Links:

KB16613: Overview of the Juniper Networks SIRT Quarterly Security Bulletin 
Publication Process

KB16765: In which releases are vulnerabilities fixed?

KB16446: Common Vulnerability Scoring System (CVSS) and Juniper's Security 
Advisories

Report a Security Vulnerability - How to Contact the Juniper Networks Security
Incident Response Team

CVSS Score:

8.0 (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H)

Risk Level:

High

Acknowledgements:

- ---

2016-10 Security Bulletin: Junos: Multiple privilege escalation 
vulnerabilities in Junos CLI (CVE-2016-4922)

Product Affected:

These issues can affect any product or platform running Junos OS.

Problem:

Certain combinations of Junos OS CLI commands and arguments have been found to
be exploitable in a way that can allow unauthorized access to the operating 
system. This may allow any user with permissions to run these CLI commands the
ability to achieve elevated privileges and gain complete control of the 
device.

These issues were found during internal product security testing.

Juniper SIRT is not aware of any malicious exploitation of these 
vulnerabilities.

No other Juniper Networks products or platforms are affected by these issues.

The set of privilege escalation vulnerabilities has been assigned 
CVE-2016-4922.

Solution:

The following software releases have been updated to resolve these specific 
issues: Junos OS 12.1X46-D60, 12.1X47-D45, 12.3R12, 12.3X48-D35, 13.2R9, 
13.3R9, 14.1R7, 14.1X53-D40, 14.1X55-D35, 14.2R5, 15.1F4, 15.1R3, 15.1X49-D60,
15.1X53-D70, 16.1R1, and all subsequent releases.

These issues are being tracked as PRs 1027807, 1117227, and 1061973, and are 
visible on the Customer Support website.

KB16765 - "In which releases are vulnerabilities fixed?" describes which 
release vulnerabilities are fixed as per our End of Engineering and End of 
Life support policies.

Workaround:

Use access lists or firewall filters to limit access to the router's CLI only
from trusted hosts. Restrict access to the CLI to only highly trusted 
administrators.

Implementation:

How to obtain fixed software:

Security vulnerabilities in Junos are fixed in the next available Maintenance
Release of each supported Junos version. In some cases, a Maintenance Release
is not planned to be available in an appropriate time-frame. For these cases,
Service Releases are made available in order to be more timely. Security 
Advisory and Security Notices will indicate which Maintenance and Service 
Releases contain fixes for the issues described. Upon request to JTAC, 
customers will be provided download instructions for a Service Release. 
Although Juniper does not provide formal Release Note documentation for a 
Service Release, a list of "PRs fixed" can be provided on request.

Modification History:

2016-10-12: Initial publication

Related Links:

KB16613: Overview of the Juniper Networks SIRT Quarterly Security Bulletin 
Publication Process

KB16765: In which releases are vulnerabilities fixed?

KB16446: Common Vulnerability Scoring System (CVSS) and Juniper's Security 
Advisories

Report a Vulnerability - How to Contact the Juniper Networks Security Incident
Response Team

CVSS Score:

8.4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Risk Level:

High

Risk Assessment:

Information for how Juniper Networks uses CVSS can be found at KB 16446 
"Common Vulnerability Scoring System (CVSS) and Juniper's Security 
Advisories."

Acknowledgements:

- ---

2016-10 Security Bulletin: Junos: IPv6 denial of service vulnerability due to
resource exhaustion (CVE-2016-4921)

Product Affected:

This issue can affect any product or platform running Junos OS with IPv6 
enabled.

Problem:

By flooding a router with specially crafted IPv6 traffic, all available 
resources can be consumed, leading to the inability to store next hop 
information for legitimate traffic. In extreme cases, the crafted IPv6 traffic
may result in a total resource exhaustion and kernel panic. The issue is 
triggered by traffic destined to the router. Transit traffic does not trigger
the vulnerability.

This issue only affects devices with IPv6 enabled and configured. Devices not
configured to process IPv6 traffic are unaffected by this vulnerability.

This issue was found during internal product security testing.

Juniper SIRT is not aware of any malicious exploitation of this vulnerability.

This issue has been assigned CVE-2016-4921.

Solution:

The kernel panic (PR 1017099) has been addressed in Junos OS 11.4R13, 
12.1X44-D45, 12.1X46-D30, 12.1X47-D20, 12.3R9, 13.3R5, and all software 
releases listed below. However, a more complete IPv6 resource management 
improvement (PR 1037225) has addressed these resource exhaustion issues in the
following software releases: 12.3X48-D30, 13.3R10*, 14.1R8, 14.1X53-D40, 
14.2R6, 15.1F2-S5, 15.1F5-S2, 15.1F6, 15.1R3, 15.1X49-D40, 15.1X53-D70, 
16.1R1, and all subsequent releases.

The two fixes for this issue are being tracked as PRs 1037225 and 1017099 
which are visible on the Customer Support website.

KB16765 - "In which releases are vulnerabilities fixed?" describes which 
release vulnerabilities are fixed as per our End of Engineering and End of 
Life support policies.

*Available end of Q4/2016.

Workaround:

Limit the exploitable attack surface of critical infrastructure networking 
equipment. Use access lists or firewall filters to limit access to the router
via IPv6 only from trusted, administrative networks or hosts.

Implementation:

How to obtain fixed software:

Security vulnerabilities in Junos are fixed in the next available Maintenance
Release of each supported Junos version. In some cases, a Maintenance Release
is not planned to be available in an appropriate time-frame. For these cases,
Service Releases are made available in order to be more timely. Security 
Advisory and Security Notices will indicate which Maintenance and Service 
Releases contain fixes for the issues described. Upon request to JTAC, 
customers will be provided download instructions for a Service Release. 
Although Juniper does not provide formal Release Note documentation for a 
Service Release, a list of "PRs fixed" can be provided on request.

Modification History:

2016-10-12: Initial publication

Related Links:

KB16613: Overview of the Juniper Networks SIRT Quarterly Security Bulletin 
Publication Process

KB16765: In which releases are vulnerabilities fixed?

KB16446: Common Vulnerability Scoring System (CVSS) and Juniper's Security 
Advisories

Report a Vulnerability - How to Contact the Juniper Networks Security Incident
Response Team

CVE-2016-4921: IPv6 denial of service vulnerability due to resource exhaustion

CVSS Score:

7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Risk Level:

High

Risk Assessment:

Information for how Juniper Networks uses CVSS can be found at KB 16446 
"Common Vulnerability Scoring System (CVSS) and Juniper's Security 
Advisories."

Acknowledgements:

- ---

2016-10 Security Bulletin: Junos Space: Multiple vulnerabilities

Product Affected:

These issues can affect any product or platform running Junos Space before 
15.2R2

Problem:

Multiple vulnerabilities have been resolved in Junos Space 15.2R2 release.

CVE 		CVSS base score 					Summary

CVE-2016-4926 	9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 	Insufficient authentication vulnerability in Junos Space may allow remote network based users with access to Junos Space web interface to perform certain administrative tasks without authentication.

CVE-2016-4927 	9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H) 	Insufficient validation of SSH keys in Junos Space may allow man-in-the-middle (MITM) type of attacks while a Space device is communicating with managed devices.

CVE-2016-4928 	7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) 	Cross site request forgery vulnerability in Junos Space may allow remote attackers to perform certain administrative actions on Junos Space.

CVE-2016-4929 	7.5 (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) 	Command injection vulnerability in Junos Space may allow unprivileged users to execute code as root user on the device.

CVE-2016-4930 	5.4 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N 	Cross site scripting vulnerability may allow remote attackers to steal sensitive information or perform certain administrative actions on Junos Space.

CVE-2016-4931 	5.3 (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) 	XML entity injection vulnerability may allow unprivileged users to cause a denial of service condition.

In addition to the above a vulnerability in Apache Commons Collections that 
can potentially allow remote code execution during object de-serialization is
fixed by upgrading Apache Commons Collections to 3.2.2. This vulnerability is
not exposed and is not exploitable on Junos Space, however the underlaying 
library is upgraded to eliminate all risks.

Juniper SIRT is not aware of any malicious exploitation of these 
vulnerabilities.

Many of these issues were found during internal product testing.

Solution:

These issues have been resolved in Junos Space 15.2R2 and all subsequent 
releases.

These issues are being tracked as 954495, 975358, 975426, 975445, 975447, 
975457, 975466, 975472, 975473, 975474, 975491, 975502, 975506, 975509, 
975510, 975516, 975518, 975530, 975534, 983931, 983945, 983960, 983964, 
1049736, 1049737, 1105605, 1138099, 1164153, 1165549 and are visible on the 
Customer Support website.

Workaround:

- - Limit access to Junos Space from only trusted networks.

- - Use administrative jump boxes with no internet access and employ 
anti-scripting techniques.

- - In addition to the recommendations listed above, it is good security 
practice to limit the exploitable attack surface of critical infrastructure 
networking equipment. Use access lists or firewall filters to limit access to
the devices administrative interfaces only from trusted, administrative 
networks or hosts.

Implementation:

How to obtain fixed software:

Junos Space Maintenance Releases are available at http://support.juniper.net 
from the "Download Software" links. If a Maintenance Release is not adequate 
and access to Junos Space patches is needed, open a customer support case. A 
JTAC engineer will review your request and respond, ensuring that you will be
provided with the most appropriate Patch Release for your specific situation.

Modification History:

2016-10-12: Initial publication

Related Links:

KB16613: Overview of the Juniper Networks SIRT Quarterly Security Bulletin 
Publication Process

KB16765: In which releases are vulnerabilities fixed?

KB16446: Common Vulnerability Scoring System (CVSS) and Juniper's Security 
Advisories

Report a Vulnerability - How to Contact the Juniper Networks Security Incident
Response Team

CVSS Score:

9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Risk Level:

Critical

- ---

2016-10 Security Bulletin: JUNOSe: Line Card Reset: processor exception 
0x68616c74 (halt) task: scheduler, upon receipt of crafted IPv6 packet 
(CVE-2016-4925)

Product Affected:

This issue can affect all E Series routers running an affected release of 
JUNOSe with IPv6 enabled.

Problem:

Receipt of a specifically malformed IPv6 packet processed by the router may 
trigger a line card reset: processor exception 0x68616c74 (halt) in task: 
scheduler. The stack trace will resemble:

- -> showCrashDump
last reset: exception 0x68616c74 (halt)
task: scheduler
halter: scheduler
halter PC: 0x8a48e8
halters arg: 0x19e9c28
pc: 0x6af77c: debugDisplay__2Ip +0x160
lr: 0x6af7d4: inetChecksum__FPUcUlUsb +0x40
dar: 0x00000000 cr: 0x42020042 xer: 0x20000000 fpcsr: 0x00000000
msr: 0x00009012 dsisr: 0x00000000 ctr: 0x00000000

The line card will reboot and recover without user interaction. However, 
additional specifically malformed packets may cause follow-on line card resets
and lead to an extended service outage.

This issue only affects E Series routers with IPv6 licensed and enabled. 
Routers not configured to process IPv6 traffic are unaffected by this 
vulnerability.

Juniper SIRT is not aware of any malicious exploitation of this vulnerability.

No other Juniper Networks products or platforms are affected by this issue.

This issue has been assigned CVE-2016-4925.

Solution:

JUNOSe releases containing the fix specifically include: 10.3.3p0-15, 
12.3.3p0-6, 13.3.3p0-1, 14.3.2, 15.1.0, and all subsequent releases. Hotfixes
are also available upon request.

This issue is being tracked as CQ 97413 and is visible on the Customer Support
website.

KB16765 - "In which releases are vulnerabilities fixed?" describes which 
release vulnerabilities are fixed as per our End of Engineering and End of 
Life support policies.

Workaround:

No known workaround exists for this issue.

Implementation:

How to obtain fixed software:

Security vulnerabilities in JUNOSe are fixed in the next available Maintenance
Release of each supported JUNOSe version. In some cases, a Maintenance Release
is not planned to be available in an appropriate time-frame. For these cases,
JUNOSe patches are made available in order to be more timely. Security 
Advisory and Security Notices will indicate which Maintenance and patch 
releases contain fixes for the issues described. Upon request to JTAC, 
customers will be provided download instructions for a patch release. Although
Juniper does not provide formal Release Note documentation for a patch 
release, a list of resolved defects are published via Patch Release Histories
available on the download page.

Modification History:

2016-10-12: Initial publication

Related Links:

KB16613: Overview of the Juniper Networks SIRT Quarterly Security Bulletin 
Publication Process

KB16765: In which releases are vulnerabilities fixed?

KB16446: Common Vulnerability Scoring System (CVSS) and Juniper's Security 
Advisories

Report a Vulnerability - How to Contact the Juniper Networks Security Incident
Response Team

CVE-2016-4925: JUNOSe Line Card Reset (halt) upon receipt of crafted IPv6 
packet

CVSS Score:

7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Risk Level:

High

Risk Assessment:

Information for how Juniper Networks uses CVSS can be found at KB 16446 
"Common Vulnerability Scoring System (CVSS) and Juniper's Security 
Advisories."

Acknowledgements:

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Z64o
-----END PGP SIGNATURE-----