Lucene search

K
nessusThis script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.JUNIPER_JSA11054.NASL
HistoryJul 14, 2021 - 12:00 a.m.

Juniper Junos OS DoS (JSA11054)

2021-07-1400:00:00
This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
26
juniper junos os
dos vulnerability
dns filtering
juniper networks
multiservices pic management daemon
denial of service
malicious dns servers

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H

EPSS

0.001

Percentile

42.5%

The version of Junos OS installed on the remote host is affected by a denial of service vulnerability as referenced in the JSA11054 advisory. When DNS filtering is enabled on Juniper Networks Junos MX Series with one of the following cards MS-PIC, MS-MIC or MS-MPC, an incoming stream of packets processed by the Multiservices PIC Management Daemon (mspmand) process, responsible for managing ‘URL Filtering service’, may crash, causing the Services PIC to restart. While the Services PIC is restarting, all PIC services including DNS filtering service (DNS sink holing) will be bypassed until the Services PIC completes its boot process. This vulnerability might allow an attacker to cause an extended Denial of Service (DoS) attack against the device and to cause clients to be vulnerable to DNS based attacks by malicious DNS servers when they send DNS requests through the device. As a result, devices which were once protected by the DNS Filtering service are no longer protected and at risk of exploitation.

Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.

#TRUSTED 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
#%NASL_MIN_LEVEL 70300
##
# (C) Tenable Network Security, Inc.
##

include('deprecated_nasl_level.inc');

include('compat.inc');

if (description)
{
  script_id(151625);
  script_version("1.4");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/07/19");

  script_cve_id("CVE-2020-1660");
  script_xref(name:"JSA", value:"JSA11054");
  script_xref(name:"IAVA", value:"2020-A-0467-S");

  script_name(english:"Juniper Junos OS DoS (JSA11054)");

  script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
  script_set_attribute(attribute:"description", value:
"The version of Junos OS installed on the remote host is affected by a denial of service vulnerability as referenced in 
the JSA11054 advisory. When DNS filtering is enabled on Juniper Networks Junos MX Series with one of the following cards
MS-PIC, MS-MIC or MS-MPC, an incoming stream of packets processed by the Multiservices PIC Management Daemon (mspmand)
process, responsible for managing 'URL Filtering service', may crash, causing the Services PIC to restart. While the
Services PIC is restarting, all PIC services including DNS filtering service (DNS sink holing) will be bypassed until
the Services PIC completes its boot process. This vulnerability might allow an attacker to cause an extended Denial of
Service (DoS) attack against the device and to cause clients to be vulnerable to DNS based attacks by malicious DNS
servers when they send DNS requests through the device. As a result, devices which were once protected by the DNS
Filtering service are no longer protected and at risk of exploitation.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version 
number.");
  script_set_attribute(attribute:"see_also", value:"https://kb.juniper.net/JSA11054");
  script_set_attribute(attribute:"solution", value:
"Apply the relevant Junos software release referenced in Juniper advisory JSA11054");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-1660");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");

  script_set_attribute(attribute:"vuln_publication_date", value:"2020/10/29");
  script_set_attribute(attribute:"patch_publication_date", value:"2020/10/29");
  script_set_attribute(attribute:"plugin_publication_date", value:"2021/07/14");

  script_set_attribute(attribute:"plugin_type", value:"combined");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:juniper:junos");
  script_set_attribute(attribute:"stig_severity", value:"I");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Junos Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("junos_version.nasl");
  script_require_keys("Host/Juniper/JUNOS/Version", "Host/Juniper/model");

  exit(0);
}

include('junos.inc');
include('junos_kb_cmd_func.inc');

var model = get_kb_item_or_exit('Host/Juniper/model');
if (model !~ "^MX")
{
  audit(AUDIT_DEVICE_NOT_VULN, model);
}

var ver = get_kb_item_or_exit('Host/Juniper/JUNOS/Version');

var vuln_ranges = [
  {'min_ver':'17.3', 'fixed_ver':'17.3R3-S8'},
  {'min_ver':'18.3', 'fixed_ver':'18.3R3-S1'},
  {'min_ver':'18.4', 'fixed_ver':'18.4R3'},
  {'min_ver':'19.1', 'fixed_ver':'19.1R3'},
  {'min_ver':'19.2', 'fixed_ver':'19.2R2'},
  {'min_ver':'19.3', 'fixed_ver':'19.3R3'}
];

var fix = junos_compare_range(target_version:ver, vuln_ranges:vuln_ranges);
if (empty_or_null(fix)) audit(AUDIT_INST_VER_NOT_VULN, 'Junos OS', ver);

var vuln_cards = make_list(
    'MS-PIC',
    'MS-MIC',
    'MS-MPC'
);

var override = TRUE;
var buf = junos_command_kb_item(cmd:'show chassis hardware models');
var vuln = FALSE;
if (junos_check_result(buf))
{
  override = FALSE;

  foreach var vuln_card (vuln_cards)
  {
    if (vuln_card >< buf)
    {
      vuln = TRUE;
      break;
    }
  }
  if(!vuln)
    audit(AUDIT_HOST_NOT, 'using an affected line card');
}

buf = junos_command_kb_item(cmd:'show configuration | display set');
if (junos_check_result(buf))
{
  if (!(junos_check_config(buf:buf, pattern:"^set services web-filter profile .+ dns-filter-template ")))
    audit(AUDIT_OS_CONF_NOT_VULN, 'Junos OS');

}
else
{
  override = TRUE;
}

junos_report(ver:ver, fix:fix, override:override, severity:SECURITY_WARNING);
VendorProductVersionCPE
juniperjunoscpe:/o:juniper:junos

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H

EPSS

0.001

Percentile

42.5%

Related for JUNIPER_JSA11054.NASL