CERT mailing list archives

Juniper Networks Releases Security Updates


From: "US-CERT" <US-CERT () ncas us-cert gov>
Date: Fri, 13 Apr 2018 08:58:49 -0500

U.S. Department of Homeland Security US-CERT

National Cyber Awareness System:



Juniper Networks Releases Security Updates [ 
https://www.us-cert.gov/ncas/current-activity/2018/04/12/Juniper-Networks-Releases-Security-Updates ] 04/12/2018 08:34 
PM EDT 
Original release date: April 12, 2018

Juniper Networks has released security updates to address vulnerabilities affecting multiple products. A remote 
attacker could exploit some of these vulnerabilities to take control of an affected system.

NCCIC encourages users and administrators to review the following Juniper Security Advisories and apply necessary 
updates:


  * Junos OS [ https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10844&cat=SIRT_1&actp=LIST ]: Kernel crash 
upon receipt of crafted CLNP packets (CVE-2018-0016) 
  * SRX Series [ https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10845&cat=SIRT_1&actp=LIST ]: 
Denial-of-service vulnerability in flowd daemon on devices configured with NAT-PT (CVE-2018-0017) 
  * SRX Series [ https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10846&cat=SIRT_1&actp=LIST ]: Crafted 
packet may lead to information disclosure and firewall rule bypass during compilation of IDP policies (CVE-2018-0018) 
  * Junos [ https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10847&cat=SIRT_1&actp=LIST ]: Denial-of-service 
vulnerability in SNMP MIB-II subagent daemon (mib2d) (CVE-2018-0019) 
  * Junos OS [ https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10848&cat=SIRT_1&actp=LIST ]: rpd daemon 
cores due to malformed BGP UPDATE packet (CVE-2018-0020) 
  * Steel-Belted Radius Carrier [ https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10849&cat=SIRT_1&actp=LIST 
]: Eclipse Jetty information disclosure vulnerability (CVE-2015-2080) 
  * NorthStar [ https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10850&cat=SIRT_1&actp=LIST ]: Return of 
Bleichenbachers Oracle Threat (ROBOT) RSA SSL attack (CVE-2017-1000385) 
  * OpenSSL [ https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10851&cat=SIRT_1&actp=LIST ]: Multiple 
vulnerabilities resolved in OpenSSL 
  * Junos OS [ https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10852&cat=SIRT_1&actp=LIST ]: Multiple 
vulnerabilities in stunnel 5.38 
  * NSM Appliance [ https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10853&cat=SIRT_1&actp=LIST ]: Multiple 
vulnerabilities resolved in CentOS 6.5-based 2012.2R12 release 
  * Junos OS [ https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10854&cat=SIRT_1&actp=LIST ]: Short MacSec 
keys may allow man-in-the-middle attacks 
  * Junos OS [ https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10855&cat=SIRT_1&actp=LIST ]: Mbuf leak due 
to processing MPLS packets in VPLS networks (CVE-2018-0022) 
  * Junos Snapshot Administrator (JSNAPy) [ 
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10856&cat=SIRT_1&actp=LIST ] world writeable default 
configuration file permission (CVE-2018-0023) 
________________________________________________________________________

This product is provided subject to this Notification [ http://www.us-cert.gov/privacy/notification ] and this Privacy 
& Use [ http://www.us-cert.gov/privacy/ ] policy.

________________________________________________________________________

A copy of this publication is available at www.us-cert.gov [ https://www.us-cert.gov ]. If you need help or have 
questions, please send an email to info () us-cert gov. Do not reply to this message since this email was sent from a 
notification-only address that is not monitored. To ensure you receive future US-CERT products, please add US-CERT () 
ncas us-cert gov to your address book. 

OTHER RESOURCES: Contact Us [ http://www.us-cert.gov/contact-us/ ] | Security Publications [ 
http://www.us-cert.gov/security-publications ] | Alerts and Tips [ http://www.us-cert.gov/ncas ] | Related Resources [ 
http://www.us-cert.gov/related-resources ]  

STAY CONNECTED: Sign up for email updates [ http://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new ] 


Current thread: