Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.1304 JSA10937 - 2019-04 Security Bulletin: Junos OS: Multiple FreeBSD vulnerabilities fixed in Junos OS. 16 April 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Junos OS Publisher: Juniper Networks Operating System: Juniper Impact/Access: Access Privileged Data -- Existing Account Denial of Service -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2018-6924 CVE-2018-3646 CVE-2018-3620 Reference: ASB-2019.0029 ASB-2018.0204 ESB-2019.0726 ESB-2018.2754 Original Bulletin: http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10937 - --------------------------BEGIN INCLUDED TEXT-------------------- 2019-04 Security Bulletin: Junos OS: Multiple FreeBSD vulnerabilities fixed in Junos OS. Article ID: JSA10937 Last Updated: 12 Apr 2019 Version: 4.0 Product Affected: Junos OS Problem: Multiple vulnerabilities that affect FreeBSD have been fixed in Junos OS. Most Juniper devices are deployed in a manner that will offer multiple layers of protection against successful exploit of these issues. Limiting access to critical infrastructure networking equipment to only trusted administrators from trusted administrative networks or hosts will prevent untrusted code execution, which is required for successful exploitation of these vulnerabilities. Junos OS can only execute code signed by Juniper (e.g. veriexec code-signing validation in Junos OS). This ensures that only code signed by Juniper can be executed on the device. Administrators can check whether veriexec is enforced by running the following command from the Junos OS shell: % sysctl security.mac.veriexec.state if veriexec is enforced, the output should be: security.mac.veriexec.state: loaded active enforce Additionally, on the platforms where veriexec is not enforced, the ability to load or execute code is limited only to privilege users. Note: on older Junos OS versions, the above command might give a different result, on these releases the alternative command is: /sbin/veriexec -i enforce the exit status will be 0 (true) if it is being enforced. If veriexec is enforced: % /sbin/veriexec -i enforce || echo "ERROR: veriexec not enforced" % if veriexec is not enforced: % /sbin/veriexec -i enforce || echo "ERROR: veriexec not enforced" ERROR: veriexec not enforced % The vulnerabilities fixed include: CVE CVSS Summary Systems with microprocessors utilizing 5.6 ( CVSS:3.0/ speculative execution and address translations CVE-2018-3620 AV:L/AC:H/PR:L/ may allow unauthorized disclosure of information UI:N/S:C/C:H/ residing in the L1 data cache to an attacker with I:N/A:N ) local user access via a terminal page fault and a side-channel analysis. Systems with microprocessors utilizing 5.6 ( CVSS:3.0/ speculative execution and address translations CVE-2018-3646 AV:L/AC:H/PR:L/ may allow unauthorized disclosure of information UI:N/S:C/C:H/ residing in the L1 data cache to an attacker with I:N/A:N ) local user access with guest OS privilege via a terminal page fault and a side-channel analysis. 7.1 ( CVSS:3.0/ Insufficient validation in the ELF header parser CVE-2018-6924 AV:L/AC:L/PR:L/ could allow a malicious ELF binary to cause a UI:N/S:U/C:H/ kernel crash or disclose kernel memory. I:N/A:H ) Solution: CVE-2018-6924 has been resolved in Junos OS 15.1F6-S12, 15.1R7-S3, 15.1X53-D237, 16.1R3-S10, 16.1R6-S6, 16.1R7-S3, 16.1X9, 16.2R2-S8, 17.1R2-S10, 17.1R3, 17.2R1-S8, 17.2R3-S1, 17.2X75-D105, 17.3R3-S4, 17.4R1-S6, 17.4R2-S2, 17.4X5, 18.1R2-S4, 18.1R3-S3, 18.2X41, 18.2X5, 18.3R1-S2, 18.3R2, 18.4R1, 18.4X1 and all subsequent releases (PR 1387416 ). CVE-2018-3620, CVE-2018-3646 have been resolved in Junos OS 17.4R1-S6, 17.4R2-S2, 17.4X5, 18.1R2-S4, 18.1R3-S3, 18.2X41, 18.2X5, 18.3R1-S2, 18.3R2, 18.4R1, 18.4X1 and all subsequent releases (PR 1381696 ) These issues are being tracked as PR 1381696 and 1387416 which are visible on the Customer Support website. Workaround: Limiting access to critical infrastructure networking equipment to only trusted administrators from trusted administrative networks or hosts will prevent untrusted code execution, hence prevent exploitation of these vulnerabilities. Implementation: Software Releases, patches and updates are available at https://www.juniper.net /support/downloads/ . Modification History: o 2019-04-10: Initial Publication. Related Links: o KB16613: Overview of the Juniper Networks SIRT Quarterly Security Bulletin Publication Process. o KB16765: In which releases are vulnerabilities fixed o KB16446: Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories o Report a Security Vulnerability - How to Contact the Juniper Networks Security Incident Response Team CVSS Score: 7.1 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H) Risk Level: High Risk Assessment: Information for how Juniper Networks uses CVSS can be found at KB 16446 "Common Vulnerability Scoring System (CVSS) and Juniper's Security Advisories." - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXLVULmaOgq3Tt24GAQhOARAAksLs0v1Kp73dcGMUJPhV9sq+K10ClfFO KsTKiRk5yH7Qdbnf9M+kolciaoOpWye33fJYabnd7fK40K4hqwe5WPycOEWDj4tw l54AWcGjkc+U9YAC5x9ZyWgZ2Y1M3/K0WP56chFToxFw9rS4lv+GBehEZT4DXj7X jaA6Tx++hP10U6USA1vsEFqBYOX73upCJgkiscDhgMzuYuZYMBJllnjnZDEmRCkA PtMVeHLJbonx+n1BuHqKMogKomf2jCL2ai/vq24DA1+fUNe5YSztTHtF4DiafnCM ZKilSVYeCTxcs1VPi4Mil6yCByvim3PIS7/4aHiebq5asafUqrIltxKU8ioI+T3K 8BcrnkPpcwrVHuS6eJ+GcWJcpJvhlM8GwakqIKZGHp/mo4vhZSgzC1Q4biBzyk3T nKlwAVIljk/g/IuTzr3WiQOhSgMIAaxRblJZqTXghLfbOjDOcaMfRsj3L5/6E2T7 Ngv6oUak9beofIAX98rIbDtqoBveIT65n++J73ID3dV5ELSV0S+pJXJnYTpoFx+r aky8RIP1I41vlinys3TMex68NnVAhqvfL8Q0iFvpOl3e1e2w5O9ne+sh46usrwyC liCLMXS4EvlP/bEnNdXwx/OlFsEjkPQhLoIq6NhR21WSJUA6KQNetJLt59OxIY/2 3auFklrx9NY= =IoGs -----END PGP SIGNATURE-----