Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2017.0089 Multiple vulnerabilities have been identified in JunOS 12 January 2017 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Juniper Junos Publisher: Juniper Networks Operating System: Juniper Impact/Access: Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2017-2303 CVE-2017-2302 CVE-2017-2301 Original Bulletin: https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10769 https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10771 https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10772 Comment: This bulletin contains three (3) Juniper Networks security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- 2017-01 Security Bulletin: Junos: Denial of service vulnerability in jdhcpd due to crafted DHCPv6 packets (CVE-2017-2301) Security Advisories ID: JSA10769 Last Updated: 11 Jan 2017 Version: 1.0 Product Affected: This issue can affect any product or platform running Junos OS with DHCPv6 enabled Problem: The Junos OS jdhcpd daemon provides advanced DHCP services to subscribers on all major hardware platforms, including MX/vMX Series, SRX Series, EX Series, QFX Series, and ACX Series. An issue was discovered that can cause jdhcpd to crash and restart when a crafted DHCPv6 packet is received from a subscriber. Repeated crashes of the jdhcpd process may constitute an extended denial of service condition for subscribers attempting to obtain IPv6 addresses. This issue only affects devices configured for DHCP services via IPv6 with either Server or Relay enabled. IPv4 is not vulnerable to this issue. Juniper SIRT is not aware of any malicious exploitation of this vulnerability. No other Juniper Networks products or platforms are affected by this issue. This issue has been assigned CVE-2017-2301. Solution: The following software releases have been updated to resolve this specific issue: Junos OS 11.4R13-S3, 12.1X46-D60, 12.3R12-S2, 12.3R13, 12.3X48-D40, 13.2X51-D40, 13.3R10, 14.1R8, 14.1X53-D12, 14.1X53-D35, 14.1X55-D35, 14.2R7, 15.1F6, 15.1R3, 15.1X49-D60, 15.1X53-D30, 16.1R1, and all subsequent releases. This issue is being tracked as PR 1137586 and is visible on the Customer Support website. KB16765 - "In which releases are vulnerabilities fixed?" describes which release vulnerabilities are fixed as per our End of Engineering and End of Life support policies. Workaround: No known workaround exists for this issue. Implementation: How to obtain fixed software: Security vulnerabilities in Junos are fixed in the next available Maintenance Release of each supported Junos version. In some cases, a Maintenance Release is not planned to be available in an appropriate time-frame. For these cases, Service Releases are made available in order to be more timely. Security Advisory and Security Notices will indicate which Maintenance and Service Releases contain fixes for the issues described. Upon request to JTAC, customers will be provided download instructions for a Service Release. Although Juniper does not provide formal Release Note documentation for a Service Release, a list of "PRs fixed" can be provided on request. Modification History: 2017-01-11: Initial publication Related Links: KB16613: Overview of the Juniper Networks SIRT Quarterly Security Bulletin Publication Process KB16765: In which releases are vulnerabilities fixed? KB16446: Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories Report a Vulnerability - How to Contact the Juniper Networks Security Incident Response Team CVE-2017-2301: Denial of service vulnerability in jdhcpd due to crafted DHCPv6 packets CVSS Score: 7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) Risk Level: High Risk Assessment: Information for how Juniper Networks uses CVSS can be found at KB 16446 "Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories." - --- 2017-01 Security Bulletin: Junos: Denial of Service vulnerability in RPD (CVE-2017-2302) Security Advisories ID: JSA10771 Last Updated: 11 Jan 2017 Version: 1.0 Product Affected: This issue can affect any product or platform running Junos OS. Problem: On Junos OS devices where the BGP add-path feature is enabled with 'send' option or with both 'send' and 'receive' options, a network based attacker can cause the Junos OS rpd daemon to crash and restart. Repeated crashes of the rpd daemon can result in an extended denial of service condition. Junos OS devices that do not have the BGP add-path feature enabled are not affected by this issue. Junos OS devices that only have the 'receive' option with BGP add-path feature enabled are not affected by this issue. Juniper SIRT is not aware of any malicious exploitation of this vulnerability. No other Juniper Networks products or platforms are affected by this issue. This issue has been assigned CVE-2017-2302. Solution: The following software releases have been updated to resolve this specific issue: Junos OS 12.1X46-D55, 12.1X47-D45, 12.3R13, 12.3X48-D35, 13.3R10, 14.1R8, 14.1X53-D40, 14.1X55-D35, 14.2R6, 15.1R1, 15.1X49-D20 and all subsequent releases. This issue is being tracked as PR 1027048 and is visible on the Customer Support website. KB16765 - "In which releases are vulnerabilities fixed?" describes which release vulnerabilities are fixed as per our End of Engineering and End of Life support policies. Workaround: Disabling the BGP add-path feature completely, or disabling the 'send' option of BGP add-path will prevent the issue from occurring. If BGP add-path feature is required then there are no known workarounds that can avoid the rpd crash. Implementation: How to obtain fixed software: Security vulnerabilities in Junos are fixed in the next available Maintenance Release of each supported Junos version. In some cases, a Maintenance Release is not planned to be available in an appropriate time-frame. For these cases, Service Releases are made available in order to be more timely. Security Advisory and Security Notices will indicate which Maintenance and Service Releases contain fixes for the issues described. Upon request to JTAC, customers will be provided download instructions for a Service Release. Although Juniper does not provide formal Release Note documentation for a Service Release, a list of "PRs fixed" can be provided on request. Modification History: 2017-01-11: Initial release. Related Links: KB16613: Overview of the Juniper Networks SIRT Quarterly Security Bulletin Publication Process KB16765: In which releases are vulnerabilities fixed? KB16446: Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories Report a Security Vulnerability - How to Contact the Juniper Networks Security Incident Response Team CVE-2017-2302: Junos Denial of Service vulnerability in RPD CVSS Score: 7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) Risk Level: High Risk Assessment: Information for how Juniper Networks uses CVSS can be found at KB 16446 "Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories." - -- 2017-01 Security Bulletin: Junos: RPD crash while processing RIP advertisements (CVE-2017-2303) Security Advisories ID: JSA10772 Last Updated: 11 Jan 2017 Version: 2.0 Product Affected: This issue can affect any product or platform running Junos OS where RIP is enabled. Problem: Certain RIP advertisements received by the router may cause the RPD daemon to crash. While the RPD daemon restarts after a crash, repeated crashes of RPD daemon can result in an extended denial of service condition. This issue only affects devices where RIP is enabled. Juniper SIRT is not aware of any malicious exploitation of this vulnerability. No other Juniper Networks products or platforms are affected by this issue. This issue has been assigned CVE-2017-2303. Solution: The following software releases have been updated to resolve this specific issue: Junos OS 12.1X46-D50, 12.1X47-D40, 12.3R13, 12.3X48-D30, 13.2X51-D40, 13.3R10, 14.1R8, 14.1X53-D35, 14.1X55-D35, 14.2R5, 15.1F6, 15.1R3, 15.1X49-D30, 15.1X49-D40, 15.1X53-D35, 16.1R1, and all subsequent releases. This issue is being tracked as PR 1129202 and is visible on the Customer Support website. KB16765 - "In which releases are vulnerabilities fixed?" describes which release vulnerabilities are fixed as per our End of Engineering and End of Life support policies. Workaround: There are no known workarounds than can prevent this issue. It is a good security practice to limit the exploitable attack surface of critical infrastructure networking equipment. Use access lists or firewall filters to limit access to the router only from trusted, administrative networks or hosts. Implementation: Security vulnerabilities in Junos are fixed in the next available Maintenance Release of each supported Junos version. In some cases, a Maintenance Release is not planned to be available in an appropriate time-frame. For these cases, Service Releases are made available in order to be more timely. Security Advisory and Security Notices will indicate which Maintenance and Service Releases contain fixes for the issues described. Upon request to JTAC, customers will be provided download instructions for a Service Release. Although Juniper does not provide formal Release Note documentation for a Service Release, a list of "PRs fixed" can be provided on request. Modification History: 2017-01-11: Initial release. Related Links: KB16613: Overview of the Juniper Networks SIRT Quarterly Security Bulletin Publication Process KB16765: In which releases are vulnerabilities fixed? KB16446: Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories Report a Security Vulnerability - How to Contact the Juniper Networks Security Incident Response Team CVE-2017-2303: Junos RPD crash while handling RIP advertisements CVSS Score: 5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) Risk Level: Medium Risk Assessment: Information for how Juniper Networks uses CVSS can be found at KB 16446 "Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories." Acknowledgements: - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWHcBu4x+lLeg9Ub1AQiO/BAApf7Yw/MMxKCMAkAzKflwSnSX7ah/wEAd rg9G4R3OdPleMbxTSDjiB7o7Ai0BCyE4ctpj/FH87dPuX8RaDCEMsqJd+KRRK+kW kFrn82jriY6D0pmrjSvIq3NgRzfKV9j9Qp+Dvn2A9kT4tFmW/B3ZiC5xxdO7CiNc vLUEiwO4thGHEtp4XWc5W0VMSnHbKhIw0Qn0YhE43LSZHayacFPS81VNTu3SZH30 iEcc2RORpZbLZsocV52YM/JHbyMQacs5vOZqcsOgLjcHhAfnG6Vnu+VpHJeMgIiX TZ1JZ/iqQKFt+sx8yntGdlcdSSOcdrlDLTKM2KOJo6wQsZkcvAz9g1fP9NcY8cyL E1KI9E/HfFA3cvBGc9qgmolWryyoDB8Yxt6A+iVsRfjSu0BHqEiCmb52SS6WjwEi qsqnNwh5p+hsKjz4IcQHOWhjRK6xMJv4+xJU4dU7UGAd4hHEVNFKR7xHh5DXXAaR /QnRK+rWQ+v1JLmw492gJbuzZuPVXdkHmJKBByrTtohFKduU01FpbIspBVDv9ypG 9Or2z7fltaJ2rrR/qTuljrH6RDuLNnfbGZvg/0V6bDxTfJ0Wl+Vv91f+EqrQT+zd O1/7PTtePsq6SLr/LhvbI9Tg865bYbkSUYSFaaWEDNzX/62GeW2mAKpAbmsS9dCA fi29AUEmgUw= =ip4T -----END PGP SIGNATURE-----