Thursday, 19 June 2014
Junos software release 14.1R1
Product Affected:
Alert Description:
This bulletin is to notify Juniper Networks customers that Junos software release 14.1R1 has been released. The software and documentation are available for download from the Juniper networks software download page.
Thursday, 12 June 2014
NetScreen Firewall: DNS lookup issue may cause denial of service
Product Affected:
NetScreen Firewalls
Problem:
A Denial of Service (DoS)
issue has been found in Juniper Networks NetScreen Firewall products.
When encountered, this issue can cause the device to crash and reboot.
If an attacker were to repeatedly exploit the issue a sustained denial
of service could take place on the device. The issue is not encountered
unless a feature is enabled that requires the device to use its built-in
DNS lookup client.
Juniper SIRT is not aware of any malicious exploitation of this vulnerability.
Solution:Juniper SIRT is not aware of any malicious exploitation of this vulnerability.
A software update for
ScreenOS has been released to resolve this issue. The release containing
the fix includes ScreenOS 6.3r17 and subsequent releases
KB16765 - "In which releases are vulnerabilities fixed?" describes which release vulnerabilities are fixed as per our End of Engineering and End of Life support policies.
Workaround:KB16765 - "In which releases are vulnerabilities fixed?" describes which release vulnerabilities are fixed as per our End of Engineering and End of Life support policies.
There is no workaround for this issue. An upgrade to a fixed version of the software for the fix.
Monday, 9 June 2014
Configuring IS-IS
Step-by-Step Procedure
The following example requires you to navigate various
levels in the configuration hierarchy. For information about navigating
the CLI, see Using the CLI Editor in Configuration Mode in the CLI User Guide.
To configure IS-IS:
- Enable IS-IS if your router is in secure context.[edit security forwarding-options family iso]user@R1# set mode packet-based
- Create the interface that connects to Device R2, and configure
the ISO family on the interface.[edit interfaces ge-1/2/0 unit 0]user@R1# set description to-R2user@R1# set family inet address 10.0.0.1/30user@R1# set family iso
- Create the loopback interface, set the IP address, and
set the NET address.[edit interfaces lo0 unit 0]user@R1# set family inet address 192.168.0.1/32user@R1# set family iso address 49.0002.0192.0168.0001.00
- Enable IS-IS on the interfaces.[edit protocols isis]user@R1# set interface ge-1/2/0.0user@R1# set interface lo0.0
Results
From configuration mode, confirm your configuration
by entering the show interfaces, show protocols, and show security commands. If the output does not display
the intended configuration, repeat the instructions in this example
to correct the configuration.
user@R1# show security
forwarding-options {family iso {mode packet-based;}}
user@R1# show interfaces
ge-1/2/0 {unit 0 {description to-R2;family inet {address 10.0.0.1/30;}family iso;}}
lo0 {unit 0 {family inet {address 192.168.0.1/32;}family iso {address 49.0002.0192.0168.0001.00;}}}
user@R1# show protocols
isis {interface ge-1/2/0.0;interface lo0.0;}
If you are done configuring the device, enter commit from configuration mode.
Friday, 6 June 2014
Vulnerabilities in OpenSSL related to ChangeCipherSpec, DTLS, SSL_MODE_RELEASE_BUFFERS and ECDH ciphersuites
Problem:
OpenSSL published an
advisory on June 5th regarding following seven vulnerabilities that have
been fixed in OpenSSL versions 0.9.8za, 1.0.0m and 1.0.1h.
Following is a summary of vulnerabilities and their status with respect to Juniper products:
CVE-2014-0224 SSL/TLS MITM vulnerability An attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server. The attack can only be performed between a vulnerable client *and* server. OpenSSL clients are vulnerable in all versions of OpenSSL. Servers are only known to be vulnerable in OpenSSL 1.0.1 and 1.0.2-beta1.
CVE-2014-0198 SSL_MODE_RELEASE_BUFFERS NULL pointer dereference A flaw in the do_ssl3_write function can allow remote attackers to cause a denial of service via a NULL pointer dereference. This flaw only affects OpenSSL 1.0.0 and 1.0.1 where SSL_MODE_RELEASE_BUFFERS is enabled, which is not the default and not common.
CVE-2010-5298 SSL_MODE_RELEASE_BUFFERS session injection or denial of service A race condition in the ssl3_read_bytes function can allow remote attackers to inject data across sessions or cause a denial of service. This flaw only affects multithreaded applications using OpenSSL 1.0.0 and 1.0.1, where SSL_MODE_RELEASE_BUFFERS is enabled, which is not the default and not common.
CVE-2014-3470 Anonymous ECDH denial of service OpenSSL TLS clients enabling anonymous ECDH ciphersuites are subject to a denial of service attack.
CVE-2014-0076 ECDSA nonce disclosure using side-channel attack The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.
CVE-2014-0221 DTLS recursion flaw By sending an invalid DTLS handshake to an OpenSSL DTLS client the code can be made to recurse eventually crashing in a DoS attack. Only applications using OpenSSL as a DTLS client are affected.
CVE-2014-0195 DTLS invalid fragment vulnerability A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server. This is potentially exploitable to run arbitrary code on a vulnerable client or server. Only applications using OpenSSL as a DTLS client or server affected.
Juniper is investigating our product portfolio for affected software that is not mentioned above. As new information becomes available this document will be updated.
Modification History:
June 5, 2014: Initial release
Solution:Following is a summary of vulnerabilities and their status with respect to Juniper products:
CVE-2014-0224 SSL/TLS MITM vulnerability An attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM) attack where the attacker can decrypt and modify traffic from the attacked client and server. The attack can only be performed between a vulnerable client *and* server. OpenSSL clients are vulnerable in all versions of OpenSSL. Servers are only known to be vulnerable in OpenSSL 1.0.1 and 1.0.2-beta1.
- Junos OS is vulnerable to this issue (PR 999736).
- SSL VPN, UAC, Junos Pulse (except non-FIPS version on iOS), Network Connect (except non-FIPS version on Windows) are vulnerable (PR 999726).
CVE-2014-0198 SSL_MODE_RELEASE_BUFFERS NULL pointer dereference A flaw in the do_ssl3_write function can allow remote attackers to cause a denial of service via a NULL pointer dereference. This flaw only affects OpenSSL 1.0.0 and 1.0.1 where SSL_MODE_RELEASE_BUFFERS is enabled, which is not the default and not common.
- Junos OS is vulnerable to this issue (PR 988917).
- SSL VPN is vulnerable to this issue (PR 988916).
CVE-2010-5298 SSL_MODE_RELEASE_BUFFERS session injection or denial of service A race condition in the ssl3_read_bytes function can allow remote attackers to inject data across sessions or cause a denial of service. This flaw only affects multithreaded applications using OpenSSL 1.0.0 and 1.0.1, where SSL_MODE_RELEASE_BUFFERS is enabled, which is not the default and not common.
- Junos OS: This issue has been resolved in all supported versions of Junos. All releases built on or after 2014-05-08 will contain the fix for this issue (PR 984416).
- SSL VPN: This issue is fixed in IVE OS 8.0r4, and 7.4r11 and all subsequent releases (PR 986446).
CVE-2014-3470 Anonymous ECDH denial of service OpenSSL TLS clients enabling anonymous ECDH ciphersuites are subject to a denial of service attack.
- Junos Pulse is not vulnerable to this issue.
- This issue is being investigated to see if any other Juniper software uses anonymous ECDH ciphersuites as a client.
CVE-2014-0076 ECDSA nonce disclosure using side-channel attack The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.
- Junos OS: releases prior to 13.3 are vulnerable to this issue (PR 982853).
CVE-2014-0221 DTLS recursion flaw By sending an invalid DTLS handshake to an OpenSSL DTLS client the code can be made to recurse eventually crashing in a DoS attack. Only applications using OpenSSL as a DTLS client are affected.
- Juniper SIRT is not aware of any Juniper products that uses DTLS for communication. Juniper products are not vulnerable to this issue.
CVE-2014-0195 DTLS invalid fragment vulnerability A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server. This is potentially exploitable to run arbitrary code on a vulnerable client or server. Only applications using OpenSSL as a DTLS client or server affected.
- Juniper SIRT is not aware of any Juniper products that uses DTLS for communication. Juniper products are not vulnerable to this issue.
Juniper is investigating our product portfolio for affected software that is not mentioned above. As new information becomes available this document will be updated.
Modification History:
June 5, 2014: Initial release
Junos Pulse/SA (SSL VPN)
We are currently investigating our product portfolio for affected software and will work to provide fixes for any software that is found to be vulnerable. Any available solution to particular CVEs is listed in the Problem section above.
Workaround:
For more information on solution available for this platform please see KB: http://kb.juniper.net/KB29195
We are currently investigating our product portfolio for affected software and will work to provide fixes for any software that is found to be vulnerable. Any available solution to particular CVEs is listed in the Problem section above.
Junos OS:
Since SSL is used for remote network configuration and management applications such as J-Web and SSL Service for JUNOScript (XNM-SSL), viable workarounds for this issue in Junos may include:
Since SSL is used for remote network configuration and management applications such as J-Web and SSL Service for JUNOScript (XNM-SSL), viable workarounds for this issue in Junos may include:
- Disabling J-Web
- Disable SSL service for JUNOScript and only use Netconf, which makes use of SSH, to make configuration changes
- Limit access to J-Web and XNM-SSL from only trusted network
Subscribe to:
Posts (Atom)
loading...