Security

Before you slink off to the pub, be sure to patch these 19 serious vulns in Juniper Networks kit

Happy New Year from the Gin Palace


Juniper Networks has had its first big bug day in months, with 19 patches announced covering everything from third-party package catchups to critical errors in password handling.

For the sake of organisation, let's pick up patches in the Junos OS first (there being so many patches, The Register will focus on those rated "High" and "Critical").

First on the critical list is CVE-2019-0006, which affects Junos OS 14.1X53, 15.1, and 15.1X53 running on EX, QFX and MX units. A crafted HTTP packet can be sent to the target, and this "can result in a crash of the fxpc daemon or may potentially lead to remote code execution".

The software inherited third-party vulnerabilities disclosed in this list of eight CVEs associated with libxml2, some dating back to 2016, and some of which are rated Critical. Versions from 12.1X46 through to 18.2X75 are affected.

High-rated CVE-2019-0001 affects MX Series devices configured with dynamic VLANs, running Junos OS 16.1 through to 18.2. A malformed packet can trigger "an uncontrolled recursion loop in the Broadband Edge subscriber management daemon (bbe-smgd)".

Junos OS 12.1X46, 12.3, 12.3X48, 14.1X53, 15.1, 15.1F, 15.1X49, 15.1X53 are subject to CVE-2019-0003, also rated High. A malicious flowspec BGP update can crash the router daemon.

BGP is also the vector for CVE-2019-0012 (High). If Junos OS 12.1X46, 12.3, 12.3X48, 14.1X53, 15.1, 15.1X49, 15.1X53, 16.1, 16.2, 17.1, 17.2, 17.3, 17.4, or 18.1 is configured as a VPLS PE (provider edge), an attacker can craft a BGP message to crash the router daemon.

In CVE-2019-0010, crafted HTTP traffic can exhaust the memory of SRX Series devices running Junos OS 12.1X46, 12.3X48, and 15.1X49.

QFX and PTX Series devices running OS 17.2X75, 17.4, 18.1, or 18.2 can be crashed with a malformed J-Flow sampling packet (CVE-2019-0014, High).

Junos OS also inherited a buggy expat XML parser library from FreeBSD, in versions 12.3, 12.3X48, 14.1X53, 15.1, 15.1F, 15.1X49, 15.1X53, 16.1. Dating back to 2015, in CVE-2015-1283 a remote, unauthenticated attacker can send crafted XML to hose the target with either an out-of-memory condition or buffer overrun.

The other third-party vulnerability inherited by the operating system was in OpenSSL, with two CVEs affecting Junos OS 12.3X48 through to 18.4R1 and all subsequent releases.

OK, I've patched Junos OS. What next?

The company has disclosed that Juniper ATP 5.0.3 and 5.0.4 has a delightful collection of 14 CVEs, including a hardcoded salt for DES password hashing, and four other cases of hardcoded credentials, so that advisory is rated Critical.

Junos Space has multiple CVEs listed here, including a Critical integer overrun in the process browsing procps-ng library, a directory traversal in the yum-utils component reposync.

As well as an SSL protocol fix, the company's Session and Resource Control software has been patched to fix the High-rated CVE-2016-2183, aka "Sweet32", a birthday attack against the DES and Triple-DES ciphers. These are fixed in SRC 4.12.0-R1 and newer versions. ®

Bootnote

It is just over three years since Juniper Networks was caught out by unauthorised code that acted as an effective backdoor to its ScreenOS firewall operating system. The diligent effort that leads to big patch efforts is more to be welcomed than condemned.

Send us news
Post a comment

Delinea Secret Server customers should apply latest patches

Attackers could nab an org's most sensitive keys if left unaddressed

CISA in a flap as Chirp smart door locks can be trivially unlocked remotely

Hard-coded credentials last thing you want in home security app

Exploit code for Palo Alto Networks zero-day now public

Race on to patch as researchers warn of mass exploitation of directory traversal bug

Rust rustles up fix for 10/10 critical command injection bug on Windows in std lib

BatBadBut hits Erlang, Go, Python, Ruby as well

Hotel check-in terminal bug spews out access codes for guest rooms

Attacks could be completed in seconds, compromising customer safety

Ivanti commits to secure-by-design overhaul after vulnerability nightmare

CEO addresses whirlwind start to 2024 and how it plans to prevent a repeat

JetBrains keeps mum on 26 'security problems' fixed after Rapid7 spat

Vendor takes hardline approach to patch disclosure to new levels

These 17,000 unpatched Microsoft Exchange servers are a ticking time bomb

One might say this is a wurst case scenario

Uncle Sam's had it up to here with 'unforgivable' SQL injection flaws

Software slackers urged to up their game

Nvidia's newborn ChatRTX bot patched for security bugs

Flaws enable privilege escalation and remote code execution

Microsoft confirms memory leak in March Windows Server security update

ALSO: Viasat hack wiper malware is back, users are the number one cause of data loss, and critical vulns

Mozilla fixes $100,000 Firefox zero-days following two-day hackathon

Users may have to upgrade twice to protect their browsers