SB2017071408 - Multiple vulnerabilities in Juniper Junos



SB2017071408 - Multiple vulnerabilities in Juniper Junos

Published: July 14, 2017

Security Bulletin ID SB2017071408
Severity
Medium
Patch available
YES
Number of vulnerabilities 12
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 42% Low 58%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 12 secuirty vulnerabilities.


1) Privilege escalation (CVE-ID: CVE-2017-2341)

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists due to authentication flaw. A local attacker on a virtualized instance can gain host privileges.

Successful exploitation of the vulnerability results in privilege escalation.

2) Buffer overflow (CVE-ID: CVE-2017-10602)

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists due to buffer overflow in the command line interface (CLI). A local attacker with read only privileges can trigger memory corruption and execute arbitrary code with root privileges.

Successful exploitation of the vulnerability may result in system compromise.

3) XML injection (CVE-ID: CVE-2017-10603)

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists due to improper handling of XML External Entity (XXE) entries when parsing an XML data. A local attacker CAN Inject XML data via the command line interface (CLI) and execute arbitrary commands with root privileges.

Successful exploitation of the vulnerability may result in system compromise.

4) Buffer overflow (CVE-ID: CVE-2017-2344)

The vulnerability allows a local attacker to gain elevated privileges or cause DoS condition on the system.

The weakness exists due to buffer overflow in an internal Junos OS sockets library. A local attacker can run a specially crafted application, trigger memory corruption, cause the kernel panic or execute arbitrary code with root privileges.

Successful exploitation of the vulnerability may result in system compromise.

5) OS command injection (CVE-ID: CVE-2017-2349)

The vulnerability allows a remote authenticated attacker to gain elevated privileges.

The weakness exists due to command injection flaw in the IDP feature. A remote attacker can execute shell commands and gain root privileges on the system.

Successful exploitation of the vulnerability results in privilege escalation.

6) Denial of service (CVE-ID: CVE-2017-2346)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to improper input validation. A remote attacker can send specially crafted large fragmented packets through an Application Layer Gateway (ALG) to cause the target MS-MPC or MS-MIC Service PIC to crash.

Successful exploitation of the vulnerability results in denial of service.

7) Resource exhaustion (CVE-ID: CVE-2017-2348)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to resource exhaustion. A remote attacker can send a specially crafted IPv6 UDP packet to cause the target Juniper Enhanced jdhcpd daemon to consume excessive CPU resources and crash or restart.

Successful exploitation of the vulnerability results in denial of service.

8) Denial of service (CVE-ID: CVE-2017-10604)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to an error in cluster mode on SRX Series systems. A remote attacker can can attempt to login to the root account with an incorrect password to trigger a lockout of the root account.

Successful exploitation of the vulnerability results in denial of service.

9) Denial of service (CVE-ID: CVE-2017-2314)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to improper input validation. A remote attacker can send a specially crafted BGP OPEN message to cause the target routing protocol daemon (rpd) process to crash and restart.

Successful exploitation of the vulnerability results in denial of service.

10) Denial of service (CVE-ID: CVE-2017-2347)

The vulnerability allows an adjacent attacker to cause DoS condition on the target system.

The weakness exists due to improper input validation. An adjacent attacker can send a specially crafted MPLS ping packet to cause the target rpd daemon to crash.

Successful exploitation of the vulnerability results in denial of service.

11) Denial of service (CVE-ID: CVE-2017-10605)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to improper input validation. A remote attacker can send a specially crafted packet to cause the target flowd process to crash.

Successful exploitation of the vulnerability results in denial of service.

12) Denial of service (CVE-ID: CVE-2017-2342)

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to the system falls back to an unencrypted link when MACsec is configured on a port that is not capable of MACsec or when a secure link can not be established. A remote attacker that can monitor the network can view potentially sensitive information on the target link.

Successful exploitation of the vulnerability results in denial of service.

Remediation

Install update from vendor's website.