The Juniper Networks Security Incident Response Team has an email
alias that makes it easy for customers and others to report potential
security vulnerabilities.
Please report any potential or real instances of security
vulnerabilities with any Juniper Networks product to the Juniper
Networks Security Incident Response Team at sirt@juniper.net.
For immediate assistance, JTAC is available 24 hours a day by calling 888-314-JTAC (North America) or +1-408-745-9500.
Thursday, 17 July 2014
Thursday, 10 July 2014
Junos: Malformed packet can cause SRX denial of service when translating traffic from IPv6 to IPv4
Product Affected:
Problem:
Workaround:
Implementation:
This issue can affect any SRX Series devices running Junos 11.4, 12.1, 12.1X44, 12.1X45, 12.1X46.
Problem:
A denial of service (DoS)
issue has been discovered in Juniper SRX Series products that can be
exploited by remote unauthenticated attackers. This issue takes place
when a certain malformed packet is translated from IPv6 to IPv4. When
this malformed packet is sent to a vulnerable SRX Series device, the
flowd process may crash. The issue can be repeatedly exploited to create
an extended denial of service condition.
Juniper SIRT is not aware of any malicious exploitation of this vulnerability.
No other Juniper Networks products or platforms are affected by this issue.
Solution:Juniper SIRT is not aware of any malicious exploitation of this vulnerability.
No other Juniper Networks products or platforms are affected by this issue.
The following software
releases have been updated to resolve this specific issue: Junos OS
11.4R8, 12.1R5, 12.1X44-D20, 12.1X45-D15, 12.1X46-D10, 12.1X47-D10, and
all subsequent releases (i.e. all releases built after 12.1X47-D10).
This issue is being tracked as PR 747680 and is visible on the Customer Support website.
KB16765 - "In which releases are vulnerabilities fixed?" describes which release vulnerabilities are fixed as per our End of Engineering and End of Life support policies.
This issue is being tracked as PR 747680 and is visible on the Customer Support website.
KB16765 - "In which releases are vulnerabilities fixed?" describes which release vulnerabilities are fixed as per our End of Engineering and End of Life support policies.
Workaround:
If NAT protocol translation from IPv6 to IPv4 is not required, disabling the feature will completely mitigate this issue.
Implementation:
How to obtain fixed software:
Security vulnerabilities in Junos are fixed in the next available Maintenance Release of each supported Junos version. In some cases, a Maintenance Release is not planned to be available in an appropriate time-frame. For these cases, Service Releases are made available in order to be more timely. Security Advisory and Security Notices will indicate which Maintenance and Service Releases contain fixes for the issues described. Upon request to JTAC, customers will be provided download instructions for a Service Release. Although Juniper does not provide formal Release Note documentation for a Service Release, a list of "PRs fixed" can be provided on request.
Security vulnerabilities in Junos are fixed in the next available Maintenance Release of each supported Junos version. In some cases, a Maintenance Release is not planned to be available in an appropriate time-frame. For these cases, Service Releases are made available in order to be more timely. Security Advisory and Security Notices will indicate which Maintenance and Service Releases contain fixes for the issues described. Upon request to JTAC, customers will be provided download instructions for a Service Release. Although Juniper does not provide formal Release Note documentation for a Service Release, a list of "PRs fixed" can be provided on request.
Wednesday, 9 July 2014
Junos : WebApp Secure
WebApp Secure Web security detects, tracks, profiles, and defends,
against hackers in real-time using intrusion deception techniques. It
inserts detection points into the code of outbound Web application
traffic that identifies attackers before they can do damage—without
false positives. It protects applications hosted in physical or
virtualized datacenters, or in the cloud.
Detect: Detection points that are inserted into web application code create a minefield that detects hackers when they manipulate them during pre-attack reconnaissance, indicating malicious intent. WebApp Secure detects it before the hacker can establish an attack vector.
Track: WebApp Secure goes beyond the IP address and tracks attackers in two unique ways, by a supercookie and fingerprinting the device.
Profile: The tracking techniques enable attacker profiling. Every attacker is assigned a name and each incident is recorded along with a threat level based on their intent and skill.
Respond: Once an attacker is detected, an appropriate response—from a warning, to requiring a CAPTCHA, to blocking a user or forcing them to logout, can be deployed manually or automatically in real-time.
Understand: The tracking techniques enable attacker and attack profiling. Every attacker is assigned a name and each incident is recorded along with a threat level based on their intent and skill.
Deployment: WebApp Secure sits logically inline and functions as a reverse proxy. Software deployment is easy and the product can be purchased in the MWS1000 appliance.
Benefit:
Deceptive Detection Points use the attacker’s behavior to detect the attack before it occurs—without false positives.
Changes the Economics of Hacking by breaking the tools that make hacking cheap and easy, forcing hackers to use manual techniques.
Prevents Automated Attacks by detecting the scanners that scour the Internet in search of unpatched vulnerabilities, and deceives them with fake data.
Zero Day Protection because WebApp Secure uses proactive, real-time detection rather than signatures which are inherently time-delayed.
No False Positives means WebApp Secure detection system is reliable.
Understanding the Attacks helps create and implement defensive measures.
Identity Beyond the IP ensures attackers devices are identified with more accurately than ever before.
Ready Out of the Box with no learning mode, and no signatures to create.
Compatible WebApp Secure can protect custom and off-the-shelf web applications without modifying code.
Web-based Console provides a real-time view of hackers from any browser.
PCI 6.6 Compliance is easily met with WebApp Secure.
Detect: Detection points that are inserted into web application code create a minefield that detects hackers when they manipulate them during pre-attack reconnaissance, indicating malicious intent. WebApp Secure detects it before the hacker can establish an attack vector.
Track: WebApp Secure goes beyond the IP address and tracks attackers in two unique ways, by a supercookie and fingerprinting the device.
Profile: The tracking techniques enable attacker profiling. Every attacker is assigned a name and each incident is recorded along with a threat level based on their intent and skill.
Respond: Once an attacker is detected, an appropriate response—from a warning, to requiring a CAPTCHA, to blocking a user or forcing them to logout, can be deployed manually or automatically in real-time.
Understand: The tracking techniques enable attacker and attack profiling. Every attacker is assigned a name and each incident is recorded along with a threat level based on their intent and skill.
Deployment: WebApp Secure sits logically inline and functions as a reverse proxy. Software deployment is easy and the product can be purchased in the MWS1000 appliance.
Benefit:
Deceptive Detection Points use the attacker’s behavior to detect the attack before it occurs—without false positives.
Changes the Economics of Hacking by breaking the tools that make hacking cheap and easy, forcing hackers to use manual techniques.
Prevents Automated Attacks by detecting the scanners that scour the Internet in search of unpatched vulnerabilities, and deceives them with fake data.
Zero Day Protection because WebApp Secure uses proactive, real-time detection rather than signatures which are inherently time-delayed.
No False Positives means WebApp Secure detection system is reliable.
Understanding the Attacks helps create and implement defensive measures.
Identity Beyond the IP ensures attackers devices are identified with more accurately than ever before.
Ready Out of the Box with no learning mode, and no signatures to create.
Compatible WebApp Secure can protect custom and off-the-shelf web applications without modifying code.
Web-based Console provides a real-time view of hackers from any browser.
PCI 6.6 Compliance is easily met with WebApp Secure.
Monday, 7 July 2014
Junos Dates & Milestones
Table below details important information relevant to each Junos
release. The dates and milestones provided are in accordance with the
policies at the time of each software release and are in accordance with
stated End of Life/End of Support policies for Juniper Networks.
Pre-12.1 Releases (other than EEOL Releases):
EOE date: The earlier of (i) the date eighteen (18) months from first general availability or (ii) two (2) subsequent releases of such software.
EOL/EOS date: The earlier of (i) the date twelve (12) months after the EOE date or (ii) two (2) subsequent releases of such software.
Release 12.1 and following (other than EEOL Releases):
EOE date: The date twenty four (24) months after the first general availability date.
EOL/EOS date: The date six (6) months after the EOE date.
1Extended End of Life (EEOL) Release:
Beginning with Junos 8.1 Juniper offers an Extended End of Life (EEOL) Release. The last Junos Release to reach general availability in a particular calendar year is the EEOL Release.
EOE date: The date thirty-six (36) months after first general availability date.
EOL/EOS date: The date six (6) months after the EOE date.
2Security Device Release:
This release is exclusively for Juniper security products. For more information, please reference PSN-2013-01-818
312.1X46 Extended End of Support:
End of Support for this release is extended until 05/10/2019 for SRX100B, SRX100H, SRX110H-VA, SRX110HVB, SRX210BE, SRX210HE, SRX210HE-POE, SRX220H, SRX220H-POE, SRX240B, SRX240B2, SRX240H, SRX240H-POE, SRX240H-DC.
End of Support for this release is extended until 07/31/2018 for the J-Series product family.
Product | FRS Date | End of Engineering | End of Support |
---|---|---|---|
Junos 14.1 | 06/13/2014 | 06/13/2016 | 12/13/2016 |
Junos 13.31 | 01/22/2014 | 01/22/2017 | 07/22/2017 |
Junos 13.2 | 08/29/2013 | 08/29/2015 | 02/29/2016 |
Junos 13.1 | 03/15/2013 | 03/15/2015 | 09/15/2015 |
Junos 12.31 | 01/31/2013 | 01/31/2016 | 07/31/2016 |
Junos 12.2 | 09/05/2012 | 09/05/2014 | 03/05/2015 |
Junos 12.1X46123 | 12/30/2013 | 12/30/2016 | 06/30/2017 |
Junos 12.1X452 | 07/17/2013 | 07/17/2014 | 01/17/2015 |
Junos 12.1X4412 | 01/18/2013 | 01/18/2016 | 07/18/2016 |
Junos 12.1 | 03/28/2012 | 03/28/2014 | 09/28/2014 |
Junos 11.41 | 12/21/2011 | 12/21/2014 | 06/21/2015 |
Junos 11.3 | 08/15/2011 | 07/15/2012 | 03/15/2013 |
Junos 11.2 | 08/03/2011 | 06/15/2012 | 02/15/2013 |
Junos 11.1 | 03/29/2011 | 11/15/2011 | 05/15/2012 |
Junos 10.41 | 12/08/2010 | 12/08/2013 | 06/08/2014 |
Junos 10.3 | 08/15/2010 | 08/03/2011 | 12/21/2011 |
Junos 10.2 | 05/28/2010 | 05/15/2011 | 11/15/2011 |
Junos 10.1 | 02/15/2010 | 11/15/2010 | 05/15/2011 |
Junos 10.01 | 11/04/2009 | 11/15/2012 | 05/15/2013 |
Junos 9.6 | 08/06/2009 | 05/06/2010 | 11/06/2010 |
Junos 9.5 | 04/14/2009 | 02/15/2010 | 08/15/2010 |
Junos 9.4 | 02/11/2009 | 11/11/2009 | 05/11/2010 |
Junos 9.31 | 11/14/2008 | 11/15/2011 | 05/15/2012 |
Junos 9.2 | 08/12/2008 | 05/12/2009 | 11/12/2009 |
Junos 9.1 | 04/28/2008 | 01/28/2009 | 07/28/2009 |
Junos 9.0 | 02/15/2008 | 11/15/2008 | 05/15/2009 |
Junos 8.51 | 11/16/2007 | 11/16/2010 | 05/16/2011 |
Junos 8.4 | 08/09/2007 | 05/09/2008 | 11/09/2008 |
Junos 8.3 | 04/18/2007 | 01/18/2008 | 07/18/2008 |
Junos 8.2 | 02/15/2007 | 11/15/2007 | 05/15/2008 |
Junos 8.11 | 11/06/2006 | 11/06/2009 | 05/06/2010 |
Junos 8.0 | 08/15/2006 | 05/15/2007 | 11/15/2007 |
Junos 7.6 | 05/15/2006 | 02/15/2007 | 08/15/2007 |
Junos 7.5 | 02/08/2006 | 11/08/2006 | 05/08/2007 |
Junos 7.4 | 11/15/2005 | 08/15/2006 | 02/15/2007 |
Junos 7.3 | 08/16/2005 | 05/16/2006 | 11/16/2006 |
Junos 7.2 | 05/14/2005 | 02/14/2006 | 08/14/2006 |
Junos 7.1 | 02/14/2005 | 11/14/2005 | 05/14/2006 |
Junos 7.0 | 11/15/2004 | 08/15/2005 | 02/15/2006 |
Junos 6.4 | 08/12/2004 | 05/12/2005 | 11/12/2005 |
Junos 6.3 | 05/15/2004 | 02/15/2005 | 08/15/2005 |
Junos 6.2 | 02/15/2004 | 11/15/2004 | 05/15/2005 |
Junos 6.1 | 11/15/2003 | 08/15/2004 | 02/15/2005 |
Junos 6.0 | 08/15/2003 | 05/15/2004 | 11/15/2004 |
Junos 5.7 | 05/15/2003 | 02/15/2004 | 08/15/2004 |
Junos 5.6 | 02/15/2003 | 11/15/2003 | 05/15/2004 |
Junos 5.5 | 11/15/2002 | 08/15/2003 | 02/15/2004 |
Junos 5.4 | 08/12/2002 | 05/15/2003 | 11/15/2003 |
Junos 5.3 | 05/12/2002 | 02/15/2003 | 08/15/2003 |
Junos 5.2 | 02/12/2002 | 11/12/2002 | 05/15/2003 |
Junos 5.1 | 11/07/2001 | 08/12/2002 | 02/15/2003 |
Junos 5.0 | 08/17/2001 | 05/15/2002 | 11/15/2002 |
Junos 4.4 | 04/30/2001 | 02/12/2002 | 08/15/2002 |
Junos 4.3 | 01/31/2001 | 11/12/2001 | 05/15/2002 |
Junos 4.2 | 10/16/2000 | 08/13/2001 | 02/15/2002 |
Junos 4.1 | 08/15/2000 | 05/14/2001 | 11/15/2001 |
Junos 4.0 | 03/31/2000 | 02/12/2001 | 08/15/2001 |
EOE date: The earlier of (i) the date eighteen (18) months from first general availability or (ii) two (2) subsequent releases of such software.
EOL/EOS date: The earlier of (i) the date twelve (12) months after the EOE date or (ii) two (2) subsequent releases of such software.
Release 12.1 and following (other than EEOL Releases):
EOE date: The date twenty four (24) months after the first general availability date.
EOL/EOS date: The date six (6) months after the EOE date.
1Extended End of Life (EEOL) Release:
Beginning with Junos 8.1 Juniper offers an Extended End of Life (EEOL) Release. The last Junos Release to reach general availability in a particular calendar year is the EEOL Release.
EOE date: The date thirty-six (36) months after first general availability date.
EOL/EOS date: The date six (6) months after the EOE date.
2Security Device Release:
This release is exclusively for Juniper security products. For more information, please reference PSN-2013-01-818
312.1X46 Extended End of Support:
End of Support for this release is extended until 05/10/2019 for SRX100B, SRX100H, SRX110H-VA, SRX110HVB, SRX210BE, SRX210HE, SRX210HE-POE, SRX220H, SRX220H-POE, SRX240B, SRX240B2, SRX240H, SRX240H-POE, SRX240H-DC.
End of Support for this release is extended until 07/31/2018 for the J-Series product family.
Subscribe to:
Posts (Atom)
loading...