Thursday, 17 July 2014

Juniper Networks: Report Potential Security Vulnerabilities

The Juniper Networks Security Incident Response Team has an email alias that makes it easy for customers and others to report potential security vulnerabilities.

Please report any potential or real instances of security vulnerabilities with any Juniper Networks product to the Juniper Networks Security Incident Response Team at sirt@juniper.net.

For immediate assistance, JTAC is available 24 hours a day by calling 888-314-JTAC (North America) or +1-408-745-9500.

Thursday, 10 July 2014

Junos: Malformed packet can cause SRX denial of service when translating traffic from IPv6 to IPv4

Product Affected:

This issue can affect any SRX Series devices running Junos 11.4, 12.1, 12.1X44, 12.1X45, 12.1X46.
 
Problem:

A denial of service (DoS) issue has been discovered in Juniper SRX Series products that can be exploited by remote unauthenticated attackers. This issue takes place when a certain malformed packet is translated from IPv6 to IPv4. When this malformed packet is sent to a vulnerable SRX Series device, the flowd process may crash. The issue can be repeatedly exploited to create an extended denial of service condition.

Juniper SIRT is not aware of any malicious exploitation of this vulnerability.

No other Juniper Networks products or platforms are affected by this issue.

Solution:
The following software releases have been updated to resolve this specific issue: Junos OS 11.4R8, 12.1R5, 12.1X44-D20, 12.1X45-D15, 12.1X46-D10, 12.1X47-D10, and all subsequent releases (i.e. all releases built after 12.1X47-D10).

This issue is being tracked as PR 747680 and is visible on the Customer Support website.

KB16765 - "In which releases are vulnerabilities fixed?" describes which release vulnerabilities are fixed as per our End of Engineering and End of Life support policies.
 
Workaround:

If NAT protocol translation from IPv6 to IPv4 is not required, disabling the feature will completely mitigate this issue.
 
Implementation:

How to obtain fixed software:

Security vulnerabilities in Junos are fixed in the next available Maintenance Release of each supported Junos version. In some cases, a Maintenance Release is not planned to be available in an appropriate time-frame. For these cases, Service Releases are made available in order to be more timely. Security Advisory and Security Notices will indicate which Maintenance and Service Releases contain fixes for the issues described. Upon request to JTAC, customers will be provided download instructions for a Service Release. Although Juniper does not provide formal Release Note documentation for a Service Release, a list of "PRs fixed" can be provided on request.

Wednesday, 9 July 2014

Junos : WebApp Secure

WebApp Secure Web security detects, tracks, profiles, and defends, against hackers in real-time using intrusion deception techniques. It inserts detection points into the code of outbound Web application traffic that identifies attackers before they can do damage—without false positives. It protects applications hosted in physical or virtualized datacenters, or in the cloud.
 
Detect: Detection points that are inserted into web application code create a minefield that detects hackers when they manipulate them during pre-attack reconnaissance, indicating malicious intent. WebApp Secure detects it before the hacker can establish an attack vector.
 
Track: WebApp Secure goes beyond the IP address and tracks attackers in two unique ways, by a supercookie and fingerprinting the device.
 
Profile: The tracking techniques enable attacker profiling. Every attacker is assigned a name and each incident is recorded along with a threat level based on their intent and skill.
 
Respond: Once an attacker is detected, an appropriate response—from a warning, to requiring a CAPTCHA, to blocking a user or forcing them to logout, can be deployed manually or automatically in real-time.
 
Understand: The tracking techniques enable attacker and attack profiling. Every attacker is assigned a name and each incident is recorded along with a threat level based on their intent and skill.
 
Deployment: WebApp Secure sits logically inline and functions as a reverse proxy. Software deployment is easy and the product can be purchased in the MWS1000 appliance.

Benefit:

Deceptive Detection Points use the attacker’s behavior to detect the attack before it occurs—without false positives.
Changes the Economics of Hacking by breaking the tools that make hacking cheap and easy, forcing hackers to use manual techniques.
Prevents Automated Attacks by detecting the scanners that scour the Internet in search of unpatched vulnerabilities, and deceives them with fake data.
Zero Day Protection because WebApp Secure uses proactive, real-time detection rather than signatures which are inherently time-delayed.
No False Positives means WebApp Secure detection system is reliable.
Understanding the Attacks helps create and implement defensive measures.
Identity Beyond the IP ensures attackers devices are identified with more accurately than ever before.
Ready Out of the Box with no learning mode, and no signatures to create.
Compatible WebApp Secure can protect custom and off-the-shelf web applications without modifying code.
Web-based Console provides a real-time view of hackers from any browser.
PCI 6.6 Compliance is easily met with WebApp Secure.

Monday, 7 July 2014

Junos Dates & Milestones

Table below details important information relevant to each Junos release. The dates and milestones provided are in accordance with the policies at the time of each software release and are in accordance with stated End of Life/End of Support policies for Juniper Networks.

ProductFRS DateEnd of EngineeringEnd of Support
Junos 14.1 06/13/2014 06/13/2016 12/13/2016
Junos 13.31 01/22/2014 01/22/2017 07/22/2017
Junos 13.2 08/29/2013 08/29/2015 02/29/2016
Junos 13.1 03/15/2013 03/15/2015 09/15/2015
Junos 12.31 01/31/2013 01/31/2016 07/31/2016
Junos 12.2 09/05/2012 09/05/2014 03/05/2015
Junos 12.1X46123 12/30/2013 12/30/2016 06/30/2017
Junos 12.1X452 07/17/2013 07/17/2014 01/17/2015
Junos 12.1X4412 01/18/2013 01/18/2016 07/18/2016
Junos 12.1 03/28/2012 03/28/2014 09/28/2014
Junos 11.41 12/21/2011 12/21/2014 06/21/2015
Junos 11.3 08/15/2011 07/15/2012 03/15/2013
Junos 11.2 08/03/2011 06/15/2012 02/15/2013
Junos 11.1 03/29/2011 11/15/2011 05/15/2012
Junos 10.41 12/08/2010 12/08/2013 06/08/2014
Junos 10.3 08/15/2010 08/03/2011 12/21/2011
Junos 10.2 05/28/2010 05/15/2011 11/15/2011
Junos 10.1 02/15/2010 11/15/2010 05/15/2011
Junos 10.01 11/04/2009 11/15/2012 05/15/2013
Junos 9.6 08/06/2009 05/06/2010 11/06/2010
Junos 9.5 04/14/2009 02/15/2010 08/15/2010
Junos 9.4 02/11/2009 11/11/2009 05/11/2010
Junos 9.31 11/14/2008 11/15/2011 05/15/2012
Junos 9.2 08/12/2008 05/12/2009 11/12/2009
Junos 9.1 04/28/2008 01/28/2009 07/28/2009
Junos 9.0 02/15/2008 11/15/2008 05/15/2009
Junos 8.51 11/16/2007 11/16/2010 05/16/2011
Junos 8.4 08/09/2007 05/09/2008 11/09/2008
Junos 8.3 04/18/2007 01/18/2008 07/18/2008
Junos 8.2 02/15/2007 11/15/2007 05/15/2008
Junos 8.11 11/06/2006 11/06/2009 05/06/2010
Junos 8.0 08/15/2006 05/15/2007 11/15/2007
Junos 7.6 05/15/2006 02/15/2007 08/15/2007
Junos 7.5 02/08/2006 11/08/2006 05/08/2007
Junos 7.4 11/15/2005 08/15/2006 02/15/2007
Junos 7.3 08/16/2005 05/16/2006 11/16/2006
Junos 7.2 05/14/2005 02/14/2006 08/14/2006
Junos 7.1 02/14/2005 11/14/2005 05/14/2006
Junos 7.0 11/15/2004 08/15/2005 02/15/2006
Junos 6.4 08/12/2004 05/12/2005 11/12/2005
Junos 6.3 05/15/2004 02/15/2005 08/15/2005
Junos 6.2 02/15/2004 11/15/2004 05/15/2005
Junos 6.1 11/15/2003 08/15/2004 02/15/2005
Junos 6.0 08/15/2003 05/15/2004 11/15/2004
Junos 5.7 05/15/2003 02/15/2004 08/15/2004
Junos 5.6 02/15/2003 11/15/2003 05/15/2004
Junos 5.5 11/15/2002 08/15/2003 02/15/2004
Junos 5.4 08/12/2002 05/15/2003 11/15/2003
Junos 5.3 05/12/2002 02/15/2003 08/15/2003
Junos 5.2 02/12/2002 11/12/2002 05/15/2003
Junos 5.1 11/07/2001 08/12/2002 02/15/2003
Junos 5.0 08/17/2001 05/15/2002 11/15/2002
Junos 4.4 04/30/2001 02/12/2002 08/15/2002
Junos 4.3 01/31/2001 11/12/2001 05/15/2002
Junos 4.2 10/16/2000 08/13/2001 02/15/2002
Junos 4.1 08/15/2000 05/14/2001 11/15/2001
Junos 4.0 03/31/2000 02/12/2001 08/15/2001
Pre-12.1 Releases (other than EEOL Releases):
EOE date: The earlier of (i) the date eighteen (18) months from first general availability or (ii) two (2) subsequent releases of such software.
EOL/EOS date: The earlier of (i) the date twelve (12) months after the EOE date or (ii) two (2) subsequent releases of such software.
Release 12.1 and following (other than EEOL Releases):
EOE date: The date twenty four (24) months after the first general availability date.
EOL/EOS date: The date six (6) months after the EOE date.

1Extended End of Life (EEOL) Release:
Beginning with Junos 8.1 Juniper offers an Extended End of Life (EEOL) Release. The last Junos Release to reach general availability in a particular calendar year is the EEOL Release.

EOE date: The date thirty-six (36) months after first general availability date.
EOL/EOS date: The date six (6) months after the EOE date.

2Security Device Release:
This release is exclusively for Juniper security products. For more information, please reference PSN-2013-01-818

312.1X46 Extended End of Support:
End of Support for this release is extended until 05/10/2019 for SRX100B, SRX100H, SRX110H-VA, SRX110HVB, SRX210BE, SRX210HE, SRX210HE-POE, SRX220H, SRX220H-POE, SRX240B, SRX240B2, SRX240H, SRX240H-POE, SRX240H-DC.

End of Support for this release is extended until 07/31/2018 for the J-Series product family.

loading...