7.8 High
CVSS2
Access Vector
Access Complexity
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
0.027 Low
EPSS
Percentile
90.6%
BGP implementations from multiple vendors including Juniper may not properly handle specially crafted BGP UPDATE messages. These vulnerabilities could allow an unauthenticated, remote attacker to cause a denial of service. Disrupting BGP communication could lead to routing instability.
The Border Gateway Protocol (BGP, RFC 4271) is a widely used inter-Autonomous System routing protocol. BGP communication among peer routers is critical to the stable operation of the internet. Multiple vendors BGP implementations do not properly handle specially crafted BGP UPDATE messages. A vulnerable BGP implementation could drop sessions when processing crafted UPDATE messages. A persistent attack could lead to routing instability (route flapping). To affect a BGP session, an attacker would need to succesfully inject a specially crafted packet into an existing BGP session or the underlying TCP session (179/tcp). In other words, the attacker would need to have a valid, configured BGP session or be able to spoof TCP traffic.
This vulnerability was first announced as affecting Juniper routers. Further investigation indicates that other vendors are affected by the same or similar issues. Please see the Systems Affected section below.
A remote attacker could cause a denial of service by injecting a specially crafted BGP UPDATE message into a legitimate BGP session. An attacker with a configured BGP session could attack targets several BGP hops away, or an attacker could spoof TCP traffic.
Upgrade
Upgrade your BGP software as appropriate. Please see the Systems Affected section below for information about specific vendors.
In order to send a specially crafted BGP UPDATE message, an attacker must have or spoof a valid BGP connection. The following workarounds and other BGP security techniques may provide some defense against spoofed connections, however spoofed connections may not be a realistic threat scenario, and the more correct resolution is to upgrade.
Authenticate BGP Traffic
Use TCP MD5 to authenticate BGP traffic (RFC 2385). Only allow BGP traffic from authorized peers. It is generally recognized that TCP MD5
Restrict BGP Access
Restrict BGP network access to authorized peers. If possible, run BGP on management networks, not transit networks. More information about BGP security (including secure BGP configuration templates) is available from the Team Cymru Reading Room.
929656
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Notified: December 13, 2007 Updated: April 28, 2008
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Updated: April 28, 2008
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2007 Updated: June 08, 2009
Statement Date: May 15, 2009
Affected
Extreme Networks products are vulnerable. This issue is being tracked by PD4-708731481.
The vendor has not provided us with any further information regarding this vulnerability.
Notified: December 13, 2007 Updated: August 12, 2008
Statement Date: February 24, 2008
Affected
AlaxalA Networks AX series and Hitachi GS/GR series are vulnerable to this issue.
AlaxalA Networks AX series
<http://www.alaxala.com/jp/support/security/20080508.html> (Japanese)
Hitachi GS/GR series
<http://www.hitachi.co.jp/Prod/comp/network/notice/BGP_UPDATE.html> (Japanese)
We are not aware of further vendor information regarding this vulnerability.
Notified: January 17, 2008 Updated: May 01, 2008
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Please see https://www.juniper.net/alerts/viewalert.jsp?actionBtn=Search&txtAlertNumber=PSN-2007-12-008&viewMod%20e=view (login required).
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23929656 Feedback>).
Updated: June 06, 2008
Statement Date: May 30, 2008
Affected
* IP8800/S/R is vulnerable.
* IP38X series is vulnerable.
* Juniper T/M/MX-series router is vulnerable.
For more detail: (only in Japanese)
We are not aware of further vendor information regarding this vulnerability.
Updated: April 28, 2008
Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Updated: May 20, 2008
Statement Date: May 09, 2008
Not Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
ACCESS acquired IP Infusion. IP Infusion maintains (or contributes heavily to the maintenance) of Zebra.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23929656 Feedback>).
Notified: December 13, 2007 Updated: May 06, 2008
Not Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2007 Updated: February 22, 2008
Statement Date: December 20, 2007
Not Affected
Force10 Networks’ switch/router product lines are unaffacted by this vulnerability.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2007 Updated: April 28, 2008
Statement Date: January 15, 2008
Not Affected
Foundry is not vulnerable. The UPDATE messages in question do not cause Foundry to drop BGP sessions.
We are not aware of further vendor information regarding this vulnerability.
Updated: April 28, 2008
Not Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Updated: May 20, 2008
Statement Date: May 09, 2008
Not Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
ACCESS acquired IP Infusion. IP Infusion maintains (or contributes heavily to the maintenance) of Zebra.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23929656 Feedback>).
Notified: February 23, 2008 Updated: May 20, 2008
Statement Date: May 09, 2008
Not Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
ACCESS acquired IP Infusion. IP Infusion maintains (or contributes heavily to the maintenance) of Zebra.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23929656 Feedback>).
Notified: December 13, 2007 Updated: December 14, 2007
Statement Date: December 13, 2007
Not Affected
NetApp Products do not implement the BGP protocol.
We are not aware of further vendor information regarding this vulnerability.
Notified: February 23, 2008 Updated: April 28, 2008
Statement Date: February 23, 2008
Not Affected
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: February 22, 2008 Updated: April 28, 2008
Statement Date: April 09, 2008
Not Affected
Sun Distributes Quagga BGPD daemon with Solaris 10 which is not vulnerable to these issues.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2007 Updated: December 13, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2007 Updated: December 13, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2007 Updated: December 13, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2007 Updated: December 13, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2007 Updated: December 13, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2007 Updated: December 13, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2007 Updated: December 13, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2007 Updated: December 13, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2007 Updated: December 13, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2007 Updated: December 13, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2007 Updated: December 13, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2007 Updated: December 13, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: April 08, 2008 Updated: April 08, 2008
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2007 Updated: December 13, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2007 Updated: December 13, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2007 Updated: December 13, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2007 Updated: December 13, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2007 Updated: December 13, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: April 08, 2008 Updated: April 08, 2008
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2007 Updated: December 13, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: February 23, 2008 Updated: February 22, 2008
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2007 Updated: December 13, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2007 Updated: December 13, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2007 Updated: December 13, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Notified: December 13, 2007 Updated: December 13, 2007
Unknown
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
View all 42 vendors __View less vendors __
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
Thanks to members of the Juniper Security Incident Response Team for help in preparing this document.
This document was written by Art Manion.
CVE IDs: | CVE-2007-6372 |
---|---|
Severity Metric: | 24.49 Date Public: |
isc.sans.org/diary.php?storyid=3748
jvn.jp/cert/JVNVU929656/index.html
nvd.nist.gov/nvd.cfm?cvename=CVE-2007-6372
osvdb.org/show/osvdb/39157
secunia.com/advisories/28100/
secunia.com/advisories/30028/
securitytracker.com/alerts/2007/Dec/1019100.html
tools.ietf.org/html/rfc2385
tools.ietf.org/html/rfc2439
tools.ietf.org/html/rfc4271
www.frsirt.com/english/advisories/2007/4223
www.iana.org/assignments/bgp-parameters
www.securityfocus.com/bid/26869
www.team-cymru.org/?sec=13&opt=28
puck.nether.net/pipermail/juniper-nsp/2007-December/009294.html
puck.nether.net/pipermail/juniper-nsp/2007-December/009299.html
www.juniper.net/alerts/viewalert.jsp?actionBtn=Search&txtAlertNumber=PSN-2007-12-008&viewMod%20e=view