-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.0089
          Multiple vulnerabilities have been identified in JunOS
                              12 January 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Juniper Junos
Publisher:         Juniper Networks
Operating System:  Juniper
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-2303 CVE-2017-2302 CVE-2017-2301

Original Bulletin: 
   https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10769
   https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10771
   https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10772

Comment: This bulletin contains three (3) Juniper Networks security 
         advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

2017-01 Security Bulletin: Junos: Denial of service vulnerability in jdhcpd
due to crafted DHCPv6 packets (CVE-2017-2301)

Security Advisories ID:		JSA10769
Last Updated:			11 Jan 2017
Version:			1.0

Product Affected:
This issue can affect any product or platform running Junos OS with
DHCPv6 enabled

Problem:
The Junos OS jdhcpd daemon provides advanced DHCP services to subscribers
on all major hardware platforms, including MX/vMX Series, SRX Series,
EX Series, QFX Series, and ACX Series.	An issue was discovered that can
cause jdhcpd to crash and restart when a crafted DHCPv6 packet is received
from a subscriber. Repeated crashes of the jdhcpd process may constitute an
extended denial of service condition for subscribers attempting to obtain
IPv6 addresses.

This issue only affects devices configured for DHCP services via IPv6 with
either Server or Relay enabled.  IPv4 is not vulnerable to this issue.

Juniper SIRT is not aware of any malicious exploitation of this
vulnerability.

No other Juniper Networks products or platforms are affected by this issue.

This issue has been assigned CVE-2017-2301.

Solution:
The following software releases have been updated to resolve this
specific issue: Junos OS 11.4R13-S3, 12.1X46-D60, 12.3R12-S2, 12.3R13,
12.3X48-D40, 13.2X51-D40, 13.3R10, 14.1R8, 14.1X53-D12, 14.1X53-D35,
14.1X55-D35, 14.2R7, 15.1F6, 15.1R3, 15.1X49-D60, 15.1X53-D30, 16.1R1,
and all subsequent releases.

This issue is being tracked as PR 1137586 and is visible on the Customer
Support website.

KB16765 - "In which releases are vulnerabilities fixed?" describes which
release vulnerabilities are fixed as per our End of Engineering and End
of Life support policies.

Workaround:
No known workaround exists for this issue.

Implementation:
How to obtain fixed software:
Security vulnerabilities in Junos are fixed in the next available
Maintenance Release of each supported Junos version. In some cases,
a Maintenance Release is not planned to be available in an appropriate
time-frame. For these cases, Service Releases are made available in order
to be more timely. Security Advisory and Security Notices will indicate
which Maintenance and Service Releases contain fixes for the issues
described. Upon request to JTAC, customers will be provided download
instructions for a Service Release. Although Juniper does not provide
formal Release Note documentation for a Service Release, a list of "PRs
fixed" can be provided on request.

Modification History:

2017-01-11: Initial publication

Related Links:

    KB16613: Overview of the Juniper Networks SIRT Quarterly Security
    Bulletin Publication Process

    KB16765: In which releases are vulnerabilities fixed?

    KB16446: Common Vulnerability Scoring System (CVSS) and Juniper's
    Security Advisories

    Report a Vulnerability - How to Contact the Juniper Networks Security
    Incident Response Team

    CVE-2017-2301: Denial of service vulnerability in jdhcpd due to crafted
    DHCPv6 packets

CVSS Score:
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Risk Level:
High

Risk Assessment:
Information for how Juniper Networks uses CVSS can be found at KB 16446
"Common Vulnerability Scoring System (CVSS) and Juniper's Security
Advisories."

- ---
2017-01 Security Bulletin: Junos: Denial of Service vulnerability in RPD
(CVE-2017-2302)

Security Advisories ID:		JSA10771
Last Updated:			11 Jan 2017
Version:			1.0

Product Affected:
This issue can affect any product or platform running Junos OS.

Problem:

On Junos OS devices where the BGP add-path feature is enabled with 'send'
option or with both 'send' and 'receive' options, a network based attacker
can cause the Junos OS rpd daemon to crash and restart. Repeated crashes
of the rpd daemon can result in an extended denial of service condition.

Junos OS devices that do not have the BGP add-path feature enabled are
not affected by this issue.

Junos OS devices that only have the 'receive' option with BGP add-path
feature enabled are not affected by this issue.

Juniper SIRT is not aware of any malicious exploitation of this
vulnerability.

No other Juniper Networks products or platforms are affected by this issue.

This issue has been assigned CVE-2017-2302.

Solution:

The following software releases have been updated to resolve this specific
issue: Junos OS 12.1X46-D55, 12.1X47-D45, 12.3R13, 12.3X48-D35, 13.3R10,
14.1R8, 14.1X53-D40, 14.1X55-D35, 14.2R6, 15.1R1, 15.1X49-D20 and all
subsequent releases.

This issue is being tracked as PR 1027048 and is visible on the Customer
Support website.

KB16765 - "In which releases are vulnerabilities fixed?" describes which
release vulnerabilities are fixed as per our End of Engineering and End
of Life support policies.

Workaround:

Disabling the BGP add-path feature completely, or disabling the 'send'
option of BGP add-path will prevent the issue from occurring.
If BGP add-path feature is required then there are no known workarounds
that can avoid the rpd crash.

Implementation:

How to obtain fixed software:

Security vulnerabilities in Junos are fixed in the next available
Maintenance Release of each supported Junos version. In some cases,
a Maintenance Release is not planned to be available in an appropriate
time-frame. For these cases, Service Releases are made available in order
to be more timely. Security Advisory and Security Notices will indicate
which Maintenance and Service Releases contain fixes for the issues
described. Upon request to JTAC, customers will be provided download
instructions for a Service Release. Although Juniper does not provide
formal Release Note documentation for a Service Release, a list of "PRs
fixed" can be provided on request.
Modification History:

2017-01-11: Initial release.

Related Links:

    KB16613: Overview of the Juniper Networks SIRT Quarterly Security
    Bulletin Publication Process

    KB16765: In which releases are vulnerabilities fixed?

    KB16446: Common Vulnerability Scoring System (CVSS) and Juniper's
    Security Advisories

    Report a Security Vulnerability - How to Contact the Juniper Networks
    Security Incident Response Team

    CVE-2017-2302: Junos Denial of Service vulnerability in RPD

CVSS Score:
7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Risk Level:
High

Risk Assessment:
Information for how Juniper Networks uses CVSS can be found at KB 16446
"Common Vulnerability Scoring System (CVSS) and Juniper's Security
Advisories."

- --
2017-01 Security Bulletin: Junos: RPD crash while processing RIP
advertisements (CVE-2017-2303)

Security Advisories ID:		JSA10772
Last Updated:			11 Jan 2017
Version:			2.0

Product Affected:
This issue can affect any product or platform running Junos OS where RIP
is enabled.

Problem:

Certain RIP advertisements received by the router may cause the RPD daemon
to crash. While the RPD daemon restarts after a crash, repeated crashes
of RPD daemon can result in an extended denial of service condition.

This issue only affects devices where RIP is enabled.

Juniper SIRT is not aware of any malicious exploitation of this
vulnerability.

No other Juniper Networks products or platforms are affected by this issue.

This issue has been assigned CVE-2017-2303.

Solution:
The following software releases have been updated to resolve this specific
issue: Junos OS 12.1X46-D50, 12.1X47-D40, 12.3R13, 12.3X48-D30, 13.2X51-D40,
13.3R10, 14.1R8, 14.1X53-D35, 14.1X55-D35, 14.2R5, 15.1F6, 15.1R3,
15.1X49-D30, 15.1X49-D40, 15.1X53-D35, 16.1R1, and all subsequent releases.

This issue is being tracked as PR 1129202 and is visible on the Customer
Support website.

KB16765 - "In which releases are vulnerabilities fixed?" describes which
release vulnerabilities are fixed as per our End of Engineering and End
of Life support policies.

Workaround:

There are no known workarounds than can prevent this issue.

It is a good security practice to limit the exploitable attack surface of
critical infrastructure networking equipment. Use access lists or firewall
filters to limit access to the router only from trusted, administrative
networks or hosts.

Implementation:

Security vulnerabilities in Junos are fixed in the next available
Maintenance Release of each supported Junos version. In some cases,
a Maintenance Release is not planned to be available in an appropriate
time-frame. For these cases, Service Releases are made available in order
to be more timely. Security Advisory and Security Notices will indicate
which Maintenance and Service Releases contain fixes for the issues
described. Upon request to JTAC, customers will be provided download
instructions for a Service Release. Although Juniper does not provide
formal Release Note documentation for a Service Release, a list of "PRs
fixed" can be provided on request.
Modification History:

2017-01-11: Initial release.

Related Links:

    KB16613: Overview of the Juniper Networks SIRT Quarterly Security
    Bulletin Publication Process

    KB16765: In which releases are vulnerabilities fixed?

    KB16446: Common Vulnerability Scoring System (CVSS) and Juniper's
    Security Advisories

    Report a Security Vulnerability - How to Contact the Juniper Networks
    Security Incident Response Team

    CVE-2017-2303: Junos RPD crash while handling RIP advertisements

CVSS Score:
5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)

Risk Level:
Medium

Risk Assessment:
Information for how Juniper Networks uses CVSS can be found at KB 16446
"Common Vulnerability Scoring System (CVSS) and Juniper's Security
Advisories."

Acknowledgements:

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=ip4T
-----END PGP SIGNATURE-----