Lucene search

K
certCERTVU:480428
HistoryMay 16, 2014 - 12:00 a.m.

Juniper ScreenOS is vulnerable to a denial of service from malformed SSL packets

2014-05-1600:00:00
www.kb.cert.org
75

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

EPSS

0.013

Percentile

85.7%

Overview

Juniper ScreenOS 6.3, and possibly earlier versions, is vulnerable to a denial of service from malformed SSL packets.

Description

Juniper ScreenOS 6.3, and possibly earlier versions, is vulnerable to a denial of service from malformed SSL packets. Additional details may be found in Juniper security advisory JSA10624.


Impact

A remote unauthenticated attacker may be able to produce an extended denial of service against a ScreenOS firewall by repeatedly sending malformed SSL/TLS packets to the device.


Solution

Apply an Update

Juniper security advisory JSA10624 recommends the following solution.

Juniper Networks has released patches to resolve this issue (see the links below):

Note: The fix will also be a part of ScreenOS 6.3.0r17 that is currently under developement.

NS-5200/5400 M3:
_<https://download.juniper.net/software/firewall/ns5000.6.3.0-M3A.r16a-dfj1.0&gt;_
NS-5200/5400 M2:
_<https://download.juniper.net/software/firewall/ns5000.6.3.0-M2A.r16a-dfj1.0&gt;_
ISG-2000 with IDP:
_<https://download.juniper.net/software/firewall/nsISG2000.6.3.0-IDP1.r16a-dfj1.0&gt;_
ISG-2000:
_<https://download.juniper.net/software/firewall/nsISG2000.6.3.0r16a-dfj1.0&gt;_
ISG-1000 with IDP:
_<https://download.juniper.net/software/firewall/nsISG1000.6.3.0-IDP1.r16a-dfj1.0&gt;_
ISG-1000:
_<https://download.juniper.net/software/firewall/nsISG1000.6.3.0r16a-dfj1.0&gt;_
SSG-520/SSG-550:
_<https://download.juniper.net/software/firewall/ssg500.6.3.0r16a-dfj1.0&gt;_
SSG-320/SSG-350:
_<https://download.juniper.net/software/firewall/ssg320ssg350.6.3.0r16a-dfj1.0&gt;_
SSG-140:
_<https://download.juniper.net/software/firewall/ssg140.6.3.0r16a-dfj1.0&gt;_
SSG-5/20:
_<https://download.juniper.net/software/firewall/ssg5ssg20.6.3.0r16a-dfj1.0&gt;_

KB16765_ - “In which releases are vulnerabilities fixed?” describes which release vulnerabilities are fixed as per our End of Engineering and End of Life support policies. _

If you are unable to patch, please consider the following workaround.


Juniper security advisory JSA10624 recommends the following workaround.

Due to the likelihood of the specific packet occurring during normal activity, Juniper recommends disabling WebUI (SSL) and WebAuth (SSL) until a software fix is available. This includes disabling WebUI (SSL) and WebAuth (SSL) even on internal and protected networks.

This issue is completely mitigated when WebUI (SSL) and WebAuth (SSL) is disabled.

Disabling SSL WebUI (HTTPS) is part of our best practices, as mentioned in KB29016.


Vendor Information

480428

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Juniper Networks, Inc. Affected

Updated: May 16, 2014

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

CVSS Metrics

Group Score Vector
Base 7.8 AV:N/AC:L/Au:N/C:N/I:N/A:C
Temporal 6.8 E:H/RL:OF/RC:C
Environmental 6.8 CDP:LM/TD:M/CR:L/IR:L/AR:H

References

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10624

Acknowledgements

Thanks to David Klein of DHK Enterprises for reporting this vulnerability.

This document was written by Jared Allar.

Other Information

CVE IDs: CVE-2014-2842
Date Public: 2014-04-16 Date First Published:

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

EPSS

0.013

Percentile

85.7%