Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2016.2404 Multiple vulnerabilities have been identified in Juniper Junos products 13 October 2016 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Junos J-Web Junos Junos Space JUNOSe Publisher: Juniper Networks Operating System: Juniper Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Increased Privileges -- Remote/Unauthenticated Access Privileged Data -- Remote/Unauthenticated Denial of Service -- Remote/Unauthenticated Cross-site Request Forgery -- Remote with User Interaction Cross-site Scripting -- Remote with User Interaction Provide Misleading Information -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2016-4931 CVE-2016-4930 CVE-2016-4929 CVE-2016-4928 CVE-2016-4927 CVE-2016-4926 CVE-2016-4925 CVE-2016-4923 CVE-2016-4922 CVE-2016-4921 Original Bulletin: http://kb.juniper.net/index?page=content&id=JSA10764 http://kb.juniper.net/index?page=content&id=JSA10762 http://kb.juniper.net/index?page=content&id=JSA10763 http://kb.juniper.net/index?page=content&id=JSA10760 http://kb.juniper.net/index?page=content&id=JSA10767 Comment: This bulletin contains five (5) Juniper Networks security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- 2016-10 Security Bulletin: Junos J-Web: Cross Site Scripting Vulnerability (CVE-2016-4923) Product Affected: This issue can affect any product or platform running Junos OS with J-Web enabled. Problem: Insufficient cross site scripting protection in J-Web may potentially allow a remote unauthenticated user to inject web script or HTML and steal sensitive data and credentials from a J-Web session and to perform administrative actions on the Junos device. Juniper SIRT is not aware of any malicious exploitation of this vulnerability. This issue has been assigned CVE-2016-4923. Solution: The following software releases have been updated to resolve this specific issue: Junos OS 12.1X44-D60, 12.1X46-D40, 12.1X47-D30, 12.3R11, 12.3X48-D20, 13.2X51-D39, 13.2X51-D40, 13.3R9, 14.1R6, 14.2R6, 15.1R3, 15.1X49-D20 and 16.1R1 and all subsequent releases. This issue is being tracked as PR 1085816 and is visible on the Customer Support website. Workaround: Access J-Web from trusted hosts which may not be compromised by cross-site scripting attacks, for example, deploying jump hosts with no internet access which use anti-scripting techniques to mitigate potential threats. Implementation: How to obtain fixed software: Security vulnerabilities in Junos are fixed in the next available Maintenance Release of each supported Junos version. In some cases, a Maintenance Release is not planned to be available in an appropriate time-frame. For these cases, Service Releases are made available in order to be more timely. Security Advisory and Security Notices will indicate which Maintenance and Service Releases contain fixes for the issues described. Upon request to JTAC, customers will be provided download instructions for a Service Release. Although Juniper does not provide formal Release Note documentation for a Service Release, a list of "PRs fixed" can be provided on request. Modification History: 2016-10-12: Initial publication Related Links: KB16613: Overview of the Juniper Networks SIRT Quarterly Security Bulletin Publication Process KB16765: In which releases are vulnerabilities fixed? KB16446: Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories Report a Security Vulnerability - How to Contact the Juniper Networks Security Incident Response Team CVSS Score: 8.0 (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H) Risk Level: High Acknowledgements: - --- 2016-10 Security Bulletin: Junos: Multiple privilege escalation vulnerabilities in Junos CLI (CVE-2016-4922) Product Affected: These issues can affect any product or platform running Junos OS. Problem: Certain combinations of Junos OS CLI commands and arguments have been found to be exploitable in a way that can allow unauthorized access to the operating system. This may allow any user with permissions to run these CLI commands the ability to achieve elevated privileges and gain complete control of the device. These issues were found during internal product security testing. Juniper SIRT is not aware of any malicious exploitation of these vulnerabilities. No other Juniper Networks products or platforms are affected by these issues. The set of privilege escalation vulnerabilities has been assigned CVE-2016-4922. Solution: The following software releases have been updated to resolve these specific issues: Junos OS 12.1X46-D60, 12.1X47-D45, 12.3R12, 12.3X48-D35, 13.2R9, 13.3R9, 14.1R7, 14.1X53-D40, 14.1X55-D35, 14.2R5, 15.1F4, 15.1R3, 15.1X49-D60, 15.1X53-D70, 16.1R1, and all subsequent releases. These issues are being tracked as PRs 1027807, 1117227, and 1061973, and are visible on the Customer Support website. KB16765 - "In which releases are vulnerabilities fixed?" describes which release vulnerabilities are fixed as per our End of Engineering and End of Life support policies. Workaround: Use access lists or firewall filters to limit access to the router's CLI only from trusted hosts. Restrict access to the CLI to only highly trusted administrators. Implementation: How to obtain fixed software: Security vulnerabilities in Junos are fixed in the next available Maintenance Release of each supported Junos version. In some cases, a Maintenance Release is not planned to be available in an appropriate time-frame. For these cases, Service Releases are made available in order to be more timely. Security Advisory and Security Notices will indicate which Maintenance and Service Releases contain fixes for the issues described. Upon request to JTAC, customers will be provided download instructions for a Service Release. Although Juniper does not provide formal Release Note documentation for a Service Release, a list of "PRs fixed" can be provided on request. Modification History: 2016-10-12: Initial publication Related Links: KB16613: Overview of the Juniper Networks SIRT Quarterly Security Bulletin Publication Process KB16765: In which releases are vulnerabilities fixed? KB16446: Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories Report a Vulnerability - How to Contact the Juniper Networks Security Incident Response Team CVSS Score: 8.4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) Risk Level: High Risk Assessment: Information for how Juniper Networks uses CVSS can be found at KB 16446 "Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories." Acknowledgements: - --- 2016-10 Security Bulletin: Junos: IPv6 denial of service vulnerability due to resource exhaustion (CVE-2016-4921) Product Affected: This issue can affect any product or platform running Junos OS with IPv6 enabled. Problem: By flooding a router with specially crafted IPv6 traffic, all available resources can be consumed, leading to the inability to store next hop information for legitimate traffic. In extreme cases, the crafted IPv6 traffic may result in a total resource exhaustion and kernel panic. The issue is triggered by traffic destined to the router. Transit traffic does not trigger the vulnerability. This issue only affects devices with IPv6 enabled and configured. Devices not configured to process IPv6 traffic are unaffected by this vulnerability. This issue was found during internal product security testing. Juniper SIRT is not aware of any malicious exploitation of this vulnerability. This issue has been assigned CVE-2016-4921. Solution: The kernel panic (PR 1017099) has been addressed in Junos OS 11.4R13, 12.1X44-D45, 12.1X46-D30, 12.1X47-D20, 12.3R9, 13.3R5, and all software releases listed below. However, a more complete IPv6 resource management improvement (PR 1037225) has addressed these resource exhaustion issues in the following software releases: 12.3X48-D30, 13.3R10*, 14.1R8, 14.1X53-D40, 14.2R6, 15.1F2-S5, 15.1F5-S2, 15.1F6, 15.1R3, 15.1X49-D40, 15.1X53-D70, 16.1R1, and all subsequent releases. The two fixes for this issue are being tracked as PRs 1037225 and 1017099 which are visible on the Customer Support website. KB16765 - "In which releases are vulnerabilities fixed?" describes which release vulnerabilities are fixed as per our End of Engineering and End of Life support policies. *Available end of Q4/2016. Workaround: Limit the exploitable attack surface of critical infrastructure networking equipment. Use access lists or firewall filters to limit access to the router via IPv6 only from trusted, administrative networks or hosts. Implementation: How to obtain fixed software: Security vulnerabilities in Junos are fixed in the next available Maintenance Release of each supported Junos version. In some cases, a Maintenance Release is not planned to be available in an appropriate time-frame. For these cases, Service Releases are made available in order to be more timely. Security Advisory and Security Notices will indicate which Maintenance and Service Releases contain fixes for the issues described. Upon request to JTAC, customers will be provided download instructions for a Service Release. Although Juniper does not provide formal Release Note documentation for a Service Release, a list of "PRs fixed" can be provided on request. Modification History: 2016-10-12: Initial publication Related Links: KB16613: Overview of the Juniper Networks SIRT Quarterly Security Bulletin Publication Process KB16765: In which releases are vulnerabilities fixed? KB16446: Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories Report a Vulnerability - How to Contact the Juniper Networks Security Incident Response Team CVE-2016-4921: IPv6 denial of service vulnerability due to resource exhaustion CVSS Score: 7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) Risk Level: High Risk Assessment: Information for how Juniper Networks uses CVSS can be found at KB 16446 "Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories." Acknowledgements: - --- 2016-10 Security Bulletin: Junos Space: Multiple vulnerabilities Product Affected: These issues can affect any product or platform running Junos Space before 15.2R2 Problem: Multiple vulnerabilities have been resolved in Junos Space 15.2R2 release. CVE CVSS base score Summary CVE-2016-4926 9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) Insufficient authentication vulnerability in Junos Space may allow remote network based users with access to Junos Space web interface to perform certain administrative tasks without authentication. CVE-2016-4927 9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H) Insufficient validation of SSH keys in Junos Space may allow man-in-the-middle (MITM) type of attacks while a Space device is communicating with managed devices. CVE-2016-4928 7.5 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H) Cross site request forgery vulnerability in Junos Space may allow remote attackers to perform certain administrative actions on Junos Space. CVE-2016-4929 7.5 (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) Command injection vulnerability in Junos Space may allow unprivileged users to execute code as root user on the device. CVE-2016-4930 5.4 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N Cross site scripting vulnerability may allow remote attackers to steal sensitive information or perform certain administrative actions on Junos Space. CVE-2016-4931 5.3 (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H) XML entity injection vulnerability may allow unprivileged users to cause a denial of service condition. In addition to the above a vulnerability in Apache Commons Collections that can potentially allow remote code execution during object de-serialization is fixed by upgrading Apache Commons Collections to 3.2.2. This vulnerability is not exposed and is not exploitable on Junos Space, however the underlaying library is upgraded to eliminate all risks. Juniper SIRT is not aware of any malicious exploitation of these vulnerabilities. Many of these issues were found during internal product testing. Solution: These issues have been resolved in Junos Space 15.2R2 and all subsequent releases. These issues are being tracked as 954495, 975358, 975426, 975445, 975447, 975457, 975466, 975472, 975473, 975474, 975491, 975502, 975506, 975509, 975510, 975516, 975518, 975530, 975534, 983931, 983945, 983960, 983964, 1049736, 1049737, 1105605, 1138099, 1164153, 1165549 and are visible on the Customer Support website. Workaround: - - Limit access to Junos Space from only trusted networks. - - Use administrative jump boxes with no internet access and employ anti-scripting techniques. - - In addition to the recommendations listed above, it is good security practice to limit the exploitable attack surface of critical infrastructure networking equipment. Use access lists or firewall filters to limit access to the devices administrative interfaces only from trusted, administrative networks or hosts. Implementation: How to obtain fixed software: Junos Space Maintenance Releases are available at http://support.juniper.net from the "Download Software" links. If a Maintenance Release is not adequate and access to Junos Space patches is needed, open a customer support case. A JTAC engineer will review your request and respond, ensuring that you will be provided with the most appropriate Patch Release for your specific situation. Modification History: 2016-10-12: Initial publication Related Links: KB16613: Overview of the Juniper Networks SIRT Quarterly Security Bulletin Publication Process KB16765: In which releases are vulnerabilities fixed? KB16446: Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories Report a Vulnerability - How to Contact the Juniper Networks Security Incident Response Team CVSS Score: 9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) Risk Level: Critical - --- 2016-10 Security Bulletin: JUNOSe: Line Card Reset: processor exception 0x68616c74 (halt) task: scheduler, upon receipt of crafted IPv6 packet (CVE-2016-4925) Product Affected: This issue can affect all E Series routers running an affected release of JUNOSe with IPv6 enabled. Problem: Receipt of a specifically malformed IPv6 packet processed by the router may trigger a line card reset: processor exception 0x68616c74 (halt) in task: scheduler. The stack trace will resemble: - -> showCrashDump last reset: exception 0x68616c74 (halt) task: scheduler halter: scheduler halter PC: 0x8a48e8 halters arg: 0x19e9c28 pc: 0x6af77c: debugDisplay__2Ip +0x160 lr: 0x6af7d4: inetChecksum__FPUcUlUsb +0x40 dar: 0x00000000 cr: 0x42020042 xer: 0x20000000 fpcsr: 0x00000000 msr: 0x00009012 dsisr: 0x00000000 ctr: 0x00000000 The line card will reboot and recover without user interaction. However, additional specifically malformed packets may cause follow-on line card resets and lead to an extended service outage. This issue only affects E Series routers with IPv6 licensed and enabled. Routers not configured to process IPv6 traffic are unaffected by this vulnerability. Juniper SIRT is not aware of any malicious exploitation of this vulnerability. No other Juniper Networks products or platforms are affected by this issue. This issue has been assigned CVE-2016-4925. Solution: JUNOSe releases containing the fix specifically include: 10.3.3p0-15, 12.3.3p0-6, 13.3.3p0-1, 14.3.2, 15.1.0, and all subsequent releases. Hotfixes are also available upon request. This issue is being tracked as CQ 97413 and is visible on the Customer Support website. KB16765 - "In which releases are vulnerabilities fixed?" describes which release vulnerabilities are fixed as per our End of Engineering and End of Life support policies. Workaround: No known workaround exists for this issue. Implementation: How to obtain fixed software: Security vulnerabilities in JUNOSe are fixed in the next available Maintenance Release of each supported JUNOSe version. In some cases, a Maintenance Release is not planned to be available in an appropriate time-frame. For these cases, JUNOSe patches are made available in order to be more timely. Security Advisory and Security Notices will indicate which Maintenance and patch releases contain fixes for the issues described. Upon request to JTAC, customers will be provided download instructions for a patch release. Although Juniper does not provide formal Release Note documentation for a patch release, a list of resolved defects are published via Patch Release Histories available on the download page. Modification History: 2016-10-12: Initial publication Related Links: KB16613: Overview of the Juniper Networks SIRT Quarterly Security Bulletin Publication Process KB16765: In which releases are vulnerabilities fixed? KB16446: Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories Report a Vulnerability - How to Contact the Juniper Networks Security Incident Response Team CVE-2016-4925: JUNOSe Line Card Reset (halt) upon receipt of crafted IPv6 packet CVSS Score: 7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) Risk Level: High Risk Assessment: Information for how Juniper Networks uses CVSS can be found at KB 16446 "Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories." Acknowledgements: - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBV/8VLox+lLeg9Ub1AQi8gQ/8D7JNWgTiTSWLJPS76xNPeNi7vaoeoFOI a/H6Eb5QsHDkVFIGN0MGZVIyorF3xHGsah5ULYwo8F1J2s0miJGkQL0cCLLFRyD0 vZdYELiJ5fKkta50rXEq0SfnEaN3EprlaN4ojKXLrPnp3K7WH7hl17O0FNg3qF3j njpFv8nOYjoGbdz2rKFrqozbu8NLZ7ZpJBKwWADJ9Uu06ptBN6AobyJX1c1xejFF 53Y3EGdUNU9FExqvqW3vEl3gondPr2t1sitwyjWDKli55sr2t4GMieZGwCjR6WyX F2J/SGU+0QOSr8QYfaHr+fvLxpONZktzVXLehRzwH7078SJ67MXW1w6EvNaoeXhz WTIrUrnYEDMLO40XXUy4Nnn/Cb4GHwhOzmnmywexCga35wgHy1m2H+wn5pT0LrRI KjleenV+AlEa4YyYqy5qjegWpdl5H1/GRaCmqFl5/gyYW3heBY1+y3GiLHUEwbCI VFG+2ZwuEtDq36i/yNxUK0FWdePEuOHFFZvwwV1j2kfcW+eiidV/9zaLLQcbanmj 15rVMCNrLrUxZV8/1SjlUBe5beVnkLg37Ahz6//Y4AgG8BKpcdSsl3uOv3TkeO7S 13q7pACjt6OijtFPn/j8GvR+8WdCIquz6NQgPtgxYbvhNiAeWCcDeDmauyDsL9VG 8lgU/L0H+x4= =Z64o -----END PGP SIGNATURE-----