
====================================================================

                             CERT-Renater

                 Note d'Information No. 2020/VULN381
_____________________________________________________________________

DATE                : 09/07/2020

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Junos OS, Junos Space, Junos OS Evolved,
                       Junos Space Security Director.

=====================================================================
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11037&cat=SIRT_1&actp=LIST
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11038&cat=SIRT_1&actp=LIST
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11036&cat=SIRT_1&actp=LIST
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11035&cat=SIRT_1&actp=LIST
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11034&cat=SIRT_1&actp=LIST
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11033&cat=SIRT_1&actp=LIST
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11031&cat=SIRT_1&actp=LIST
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11032&cat=SIRT_1&actp=LIST
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11028&cat=SIRT_1&actp=LIST
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11027&cat=SIRT_1&actp=LIST
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11026&cat=SIRT_1&actp=LIST
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11025&cat=SIRT_1&actp=LIST
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11024&cat=SIRT_1&actp=LIST
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11030&cat=SIRT_1&actp=LIST
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11023&cat=SIRT_1&actp=LIST
_____________________________________________________________________


2020-07 Security Bulletin: Junos OS: MX Series: Denial of Service
vulnerability in MS-PIC component on MS-MIC or MS-MPC (CVE-2020-1650)


Product Affected:

This issue affects Junos OS 17.2, 17.3, 17.4, 18.1, 18.2, 18.3, 18.4,
19.1, 19.2, 19.3. Affected platforms: MX Series.


Problem:

On Juniper Networks Junos MX Series with service card configured,
receipt of a stream of specific packets may crash the MS-PIC component
on MS-MIC or MS-MPC.

By continuously sending these specific packets, an attacker can
repeatedly bring down MS-PIC on MS-MIC/MS-MPC causing a prolonged Denial
of Service.

This issue affects MX Series devices using MS-PIC, MS-MIC or MS-MPC
service cards with any service configured.

This issue affects Juniper Networks Junos OS on MX Series:

17.2R2-S7;

17.3R3-S4, 17.3R3-S5;

17.4R2-S4 and the subsequent SRs (17.4R2-S5, 17.4R2-S6, etc.);

17.4R3;

18.1R3-S3, 18.1R3-S4, 18.1R3-S5, 18.1R3-S6, 18.1R3-S7, 18.1R3-S8;

18.2R3, 18.2R3-S1, 18.2R3-S2;

18.3R2 and the SRs based on 18.3R2;

18.4R2 and the SRs based on 18.4R2;

19.1R1 and the SRs based on 19.1R1;

19.2R1 and the SRs based on 19.2R1;

19.3R1 and the SRs based on 19.3R1.

Juniper SIRT is not aware of any malicious exploitation of this
vulnerability.

This issue was seen during production usage.

This issue has been assigned CVE-2020-1650.


Solution:

The following software releases have been updated to resolve this
specific issue: 17.2R2-S8, 17.3R3-S6, 17.4R3-S1, 18.1R3-S9, 18.2R3-S3,
18.3R3, 18.4R3, 19.1R2, 19.2R2, 19.3R2, 19.4R1, and all subsequent
releases.

This issue is being tracked as 1453811.


Workaround:

There are no known workarounds for this issue.


Implementation:

Software releases or updates are available for download at
https://www.juniper.net/support/downloads/.


Modification History:

​2020-07-08: Initial publication

CVSS Score:
7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)


Severity Level:
Medium


Severity Assessment:
Information for how Juniper Networks uses CVSS can be found at KB 16446
"Common Vulnerability Scoring System (CVSS) and Juniper's Security
Advisories."

_____________________________________________________________________


2020-07 Security Bulletin: Junos OS: MX Series: PFE on the line card may
crash due to memory leak. (CVE-2020-1651)


Product Affected:
This issue affects Junos OS 17.2, 17.2X75, 17.3, 17.4, 18.1. Affected
platforms: MX Series.


Problem:

On Juniper Networks MX series, receipt of a stream of specific Layer 2
frames may cause a memory leak resulting in the packet forwarding engine
(PFE) on the line card to crash and restart, causing traffic interruption.

By continuously sending this stream of specific layer 2 frame, an
attacker connected to the same broadcast domain can repeatedly crash the
PFE, causing a prolonged Denial of Service (DoS).

This issue affects Juniper Networks Junos OS on MX Series:

17.2 versions prior to 17.2R3-S4;

17.2X75 versions prior to 17.2X75-D105.19;

17.3 versions prior to 17.3R3-S7;

17.4 versions prior to 17.4R1-S3, 17.4R2;

18.1 versions prior to 18.1R2.

This issue does not affect Juniper Networks Junos OS releases prior to
17.2R1.

This issue is not specific to any configuration.

Juniper SIRT is not aware of any malicious exploitation of this
vulnerability.

This issue was seen during production usage.

This issue has been assigned CVE-2020-1651.


Solution:

The following software releases have been updated to resolve this
specific issue: 17.2R3-S4, 17.2X75-D105.19, 17.3R3-S7, 17.4R1-S3,
17.4R2, 18.1R2, 18.2R1, 18.2X75-D10, and all subsequent releases.

This issue is being tracked as 1347250.


Workaround:

There are no available workarounds for this issue.


Implementation:
Software releases or updates are available for download at
https://www.juniper.net/support/downloads/.


Modification History:

​2020-07-08: Initial publication

CVSS Score:
6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Severity Level:
Medium

Severity Assessment:
Information for how Juniper Networks uses CVSS can be found at KB 16446
"Common Vulnerability Scoring System (CVSS) and Juniper's Security
Advisories."

_____________________________________________________________________


2020-07 Security Bulletin:Junos OS: MX Series: PFE crash on MPC7/8/9
upon receipt of small fragments requiring reassembly (CVE-2020-1649)

Product Affected:
This issue affects Junos OS 17.2, 17.3, 17.4, 18.1, 18.2, 18.2X75, 18.3,
18.4, 19.1, 19.2, 19.3. Affected platforms: MX Series.


Problem:

When a device running Juniper Networks Junos OS with MPC7, MPC8, or MPC9
line cards installed and the system is configured for inline IP
reassembly, used by L2TP, MAP-E, GRE, and IPIP, the packet forwarding
engine (PFE) will become disabled upon receipt of small fragments
requiring reassembly, generating the following error messages:

[LOG: Err] MQSS(2): WO: Packet Error - Error Packets 1, Connection 29
[LOG: Err] eachip_hmcif_rx_intr_handler(7259): EA[2:0]: HMCIF Rx:
Injected checksum error detected on WO response - Chunk Address 0x0
[LOG: Err] MQSS(2): DRD: RORD1: CMD reorder ID error - Command 11,
Reorder ID 1960, QID 0
[LOG: Err] MQSS(2): DRD: UNROLL0: HMC chunk address error in stage 5 -
Chunk Address: 0xc38fb1
[LOG: Notice] Error:
/fpc/0/pfe/0/cm/0/MQSS(2)/2/MQSS_CMERROR_DRD_RORD_ENG_INT_REG_CMD_FSM_STATE_ERR
(0x2203cc), scope: pfe, category: functional, severity: major, module:
MQSS(2), type: DRD_RORD_ENG_INT: CMD FSM State Error
[LOG: Notice] Performing action cmalarm for error
/fpc/0/pfe/0/cm/0/MQSS(2)/2/MQSS_CMERROR_DRD_RORD_ENG_INT_REG_CMD_FSM_STATE_ERR
(0x2203cc) in module: MQSS(2) with scope: pfe category: functional
level: major
[LOG: Notice] Performing action get-state for error
/fpc/0/pfe/0/cm/0/MQSS(2)/2/MQSS_CMERROR_DRD_RORD_ENG_INT_REG_CMD_FSM_STATE_ERR
(0x2203cc) in module: MQSS(2) with scope: pfe category: functional
level: major
[LOG: Notice] Performing action disable-pfe for error
/fpc/0/pfe/0/cm/0/MQSS(2)/2/MQSS_CMERROR_DRD_RORD_ENG_INT_REG_CMD_FSM_STATE_ERR
(0x2203cc) in module: MQSS(2) with scope: pfe category: functional
level: major


By continuously sending fragmented packets that cannot be reassembled,
an attacker can repeatedly disable the PFE causing a sustained Denial of
Service (DoS).


This issue affects Juniper Networks Junos OS:

    17.2 versions prior to 17.2R3-S4 on MX Series;
    17.3 versions prior to 17.3R3-S8 on MX Series;
    17.4 versions prior to 17.4R2-S9, 17.4R3-S1 on MX Series;
    18.1 versions prior to 18.1R3-S10 on MX Series;
    18.2 versions prior to 18.2R2-S6, 18.2R3-S3 on MX Series;
    18.2X75 versions prior to 18.2X75-D34, 18.2X75-D41, 18.2X75-D53,
18.2X75-D65, 18.2X75-D430 on MX Series;
    18.3 versions prior to 18.3R1-S7, 18.3R2-S4, 18.3R3-S2 on MX Series;
    18.4 versions prior to 18.4R1-S6, 18.4R2-S4, 18.4R3 on MX Series;
    19.1 versions prior to 19.1R1-S4, 19.1R2-S1, 19.1R3 on MX Series;
    19.2 versions prior to 19.2R1-S3, 19.2R2 on MX Series;
    19.3 versions prior to 19.3R2-S2, 19.3R3 on MX Series.

This issue is specific to inline IP reassembly, introduced in Junos OS
17.2. Versions of Junos OS prior to 17.2 are unaffected by this
vulnerability.


A sample configuration for enabling inline IP reassembly is shown below:
set chassis fpc 8 pic 0 inline-services bandwidth 100g


Note: Explicitly specifying a bandwidth for tunnel traffic using inline
services is not required. When a bandwidth is not specified, the maximum
bandwidth supported on the PIC is automatically available for the inline
services.

Juniper SIRT is not aware of any malicious exploitation of this
vulnerability.

This issue was seen during production usage.

This issue has been assigned CVE-2020-1649.


Solution:

The following software releases have been updated to resolve this
specific issue: Junos OS 17.2R3-S4, 17.3R3-S8, 17.4R2-S9, 17.4R3-S1,
18.1R3-S10, 18.2R2-S6, 18.2R3-S3, 18.2X75-D34, 18.2X75-D41, 18.2X75-D53,
18.2X75-D65, 18.2X75-D430, 18.3R1-S7, 18.3R2-S4, 18.3R3-S2, 18.4R1-S6,
18.4R2-S4, 18.4R3, 19.1R1-S4, 19.1R2-S1, 19.1R3, 19.2R1-S3, 19.2R2,
19.3R2-S2, 19.3R3, 19.4R1, 19.4R2, 20.1R1, and all subsequent releases.

This issue is being tracked as 1465490.


Workaround:
There are no available workarounds for this issue.


Implementation:
Software releases or updates are available for download at
https://www.juniper.net/support/downloads/.


Modification History:

​2020-07-08: Initial publication


CVSS Score:
7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Severity Level:
High


Severity Assessment:
Information for how Juniper Networks uses CVSS can be found at KB 16446
"Common Vulnerability Scoring System (CVSS) and Juniper's Security
Advisories."

_____________________________________________________________________


2020-07 Security Bulletin: Junos OS and Junos OS Evolved: RPD crash when
processing a specific BGP packet (CVE-2020-1648)


Product Affected:
This issue affects Junos OS 18.2X75, 19.4, 20.1. This issue affects
Junos OS Evolved 19.4-EVO, 20.1-EVO.


Problem:

On Juniper Networks Junos OS and Junos OS Evolved devices, processing a
specific BGP packet can lead to a routing process daemon (RPD) crash and
restart.

This issue can occur even before the BGP session with the peer is
established.

Repeated receipt of this specific BGP packet can result in an extended
Denial of Service (DoS) condition.

This issue affects:

Juniper Networks Junos OS:

18.2X75 versions starting from 18.2X75-D50.8, 18.2X75-D60 and later
versions, prior to 18.2X75-D52.8, 18.2X75-D53, 18.2X75-D60.2,
18.2X75-D65.1, 18.2X75-D70;

19.4 versions 19.4R1 and 19.4R1-S1;

20.1 versions prior to 20.1R1-S2, 20.1R2.

Juniper Networks Junos OS Evolved:

19.4-EVO versions prior to 19.4R2-S2-EVO;

20.1-EVO versions prior to 20.1R2-EVO.

This issue does not affect:

Juniper Networks Junos OS releases prior to 19.4R1.

Juniper Networks Junos OS Evolved releases prior to 19.4R1-EVO.

Juniper SIRT is not aware of any malicious exploitation of this
vulnerability.

This issue was seen during production usage.

This issue has been assigned CVE-2020-1648.


Solution:

The following software releases have been updated to resolve this
specific issue:

Junos OS: 18.2X75-D52.8, 18.2X75-D53, 18.2X75-D60.2, 18.2X75-D65.1,
18.2X75-D70, 19.4R1-S2, 19.4R2, 20.1R1-S2, 20.1R2, 20.2R1, and all
subsequent releases.

Junos OS Evolved: 19.4R2-S2-EVO, 20.1R2-EVO, 20.2R1-EVO and all
subsequent releases.

This issue is being tracked as 1502327.


Workaround:

There are no viable workarounds for this issue.


Implementation:
Software releases or updates are available for download at
https://www.juniper.net/support/downloads/.


Modification History:

​2020-07-08: Initial publication

CVSS Score:
7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)


Severity Level:
High


Severity Assessment:
Information for how Juniper Networks uses CVSS can be found at KB 16446
"Common Vulnerability Scoring System (CVSS) and Juniper's Security
Advisories."

_____________________________________________________________________


2020-07 Security Bulletin: Junos OS: SRX Series: Double free
vulnerability can lead to DoS or remote code execution due to the
processing of a specific HTTP message when ICAP redirect service is
enabled (CVE-2020-1647)


Product Affected:
This issue affects Junos OS 18.1, 18.2, 18.3, 18.4, 19.1, 19.2, 19.3.


Problem:

On Juniper Networks SRX Series with ICAP (Internet Content Adaptation
Protocol) redirect service enabled, a double free vulnerability can lead
to a Denial of Service (DoS) or Remote Code Execution (RCE) due to
processing of a specific HTTP message.

Continued processing of this specific HTTP message may result in an
extended Denial of Service (DoS).

The offending HTTP message that causes this issue may originate both
from the HTTP server or the client.

This issue affects Juniper Networks Junos OS on SRX Series:

18.1 versions prior to 18.1R3-S9;

18.2 versions prior to 18.2R3-S3;

18.3 versions prior to 18.3R2-S4, 18.3R3-S1;

18.4 versions prior to 18.4R2-S5, 18.4R3;

19.1 versions prior to 19.1R2;

19.2 versions prior to 19.2R1-S2, 19.2R2;

19.3 versions prior to 19.3R2.

This issue does not affect Juniper Networks Junos OS prior to 18.1R1.

This issue may occur only when ICAP Redirect Service is enabled.

The examples of minimum config stanza affected by this issue:
[services icap-redirect profile <ICAP_PROFILE_NAME>]

in combination with:
[security policies from-zone <ZONE_NAME> to-zone <ZONE_NAME> policy
<POLICY_NAME> then permit application-services <ICAP_PROFILE_NAME>]

Juniper SIRT is not aware of any malicious exploitation of this
vulnerability.

This issue was seen during production usage.

This issue has been assigned CVE-2020-1647.


Solution:

The following software releases have been updated to resolve this
specific issue: 18.1R3-S9, 18.2R3-S3, 18.3R2-S4, 18.3R3-S1, 18.4R2-S5,
18.4R3, 19.1R2, 19.2R1-S2, 19.2R2, 19.3R2, 19.4R1, and all subsequent
releases.

This issue is being tracked as 1465286.


Workaround:

Disable ICAP redirect service otherwise there are no viable workarounds
for this issue.


Implementation:
Software releases or updates are available for download at
https://www.juniper.net/support/downloads/.


Modification History:

​2020-07-08: Initial publication

CVSS Score:
9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)


Severity Level:
Critical


Severity Assessment:
Information for how Juniper Networks uses CVSS can be found at KB 16446
"Common Vulnerability Scoring System (CVSS) and Juniper's Security
Advisories."

_____________________________________________________________________


2020-07 Security Bulletin: Junos OS and Junos OS Evolved: RPD crash
while processing a specific BGP update information. (CVE-2020-1646)


Product Affected:
This issue affects Junos OS 17.3, 17.4, 18.1. This issue affects Junos
OS Evolved 19.2-EVO.


Problem:

On Juniper Networks Junos OS and Junos OS Evolved devices, processing a
specific UPDATE for an EBGP peer can lead to a routing process daemon
(RPD) crash and restart.

This issue occurs only when the device is receiving and processing the
BGP UPDATE for an EBGP peer.

This issue does not occur when the device is receiving and processing
the BGP UPDATE for an IBGP peer.

However, the offending BGP UPDATE can originally come from an EBGP peer,
propagates through the network via IBGP peers without causing crash,
then it causes RPD crash when it is processed for a BGP UPDATE towards
an EBGP peer.

Repeated receipt and processing of the same specific BGP UPDATE can
result in an extended Denial of Service (DoS) condition.

This issue affects:

Juniper Networks Junos OS: 17.3R3-S6, 17.4R2-S7, and 18.1R3-S7.

Juniper Networks Junos OS Evolved 19.2R2-EVO and later versions, prior
to 19.3R1-EVO.

Other Junos OS releases are not affected.

Juniper SIRT is not aware of any malicious exploitation of this
vulnerability.

This issue was seen during production usage.

This issue has been assigned CVE-2020-1646.


Solution:

The following software releases have been updated to resolve this
specific issue:

Junos OS: 17.3R3-S7, 17.4R2-S8, 18.1R3-S8, and all subsequent releases.

This fix has been proactively committed to other Junos OS releases that
are not vulnerable to this issue.

Junos OS Evolved: 19.3R1-EVO and all subsequent releases.

This issue is being tracked as 1448425.


Workaround:

There are no available workarounds for this issue.


Implementation:
Software releases or updates are available for download at
https://www.juniper.net/support/downloads/.


Modification History:

​2020-07-08: Initial publication

CVSS Score:
7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)


Severity Level:
High


Severity Assessment:
Information for how Juniper Networks uses CVSS can be found at KB 16446
"Common Vulnerability Scoring System (CVSS) and Juniper's Security
Advisories."

_____________________________________________________________________


2020-07 Security Bulletin: Junos OS: SRX Series: processing a malformed
HTTP message when ICAP redirect service is enabled may can lead to flowd
process crash or remote code execution (CVE-2020-1654)


Product Affected:
This issue affects Junos OS 18.1, 18.2, 18.3, 18.4, 19.1, 19.2, 19.3.
Affected platforms: SRX Series.


Problem:

On Juniper Networks SRX Series with ICAP (Internet Content Adaptation
Protocol) redirect service enabled, processing a malformed HTTP message
can lead to a Denial of Service (DoS) or Remote Code Execution (RCE)

Continued processing of this malformed HTTP message may result in an
extended Denial of Service (DoS) condition.

The offending HTTP message that causes this issue may originate both
from the HTTP server or the HTTP client.

This issue affects Juniper Networks Junos OS on SRX Series:

18.1 versions prior to 18.1R3-S9 ;

18.2 versions prior to 18.2R2-S7, 18.2R3-S3;

18.3 versions prior to 18.3R1-S7, 18.3R2-S4, 18.3R3-S1;

18.4 versions prior to 18.4R1-S7, 18.4R2-S4, 18.4R3;

19.1 versions prior to 19.1R1-S5, 19.1R2;

19.2 versions prior to 19.2R1-S2, 19.2R2;

19.3 versions prior to 19.3R2.

This issue does not affect Juniper Networks Junos OS prior to 18.1R1.

This issue may occur only when ICAP Redirect Service is enabled.

The examples of minimum config stanza affected by this issue:
[services icap-redirect profile <ICAP_PROFILE_NAME>]

in combination with:
[security policies from-zone <ZONE_NAME> to-zone <ZONE_NAME> policy
<POLICY_NAME> then permit application-services <ICAP_PROFILE_NAME>]

Juniper SIRT is not aware of any malicious exploitation of this
vulnerability.

This issue was seen during production usage.

This issue has been assigned CVE-2020-1654.


Solution:

The following software releases have been updated to resolve this
specific issue: 18.1R3-S9, 18.2R2-S7, 18.2R3-S3, 18.3R1-S7, 18.3R2-S4,
18.3R3-S1, 18.4R1-S7, 18.4R2-S4, 18.4R3, 19.1R1-S5, 19.1R2, 19.2R1-S2,
19.2R2, 19.3R2, 19.4R1, and all subsequent releases.


This issue is being tracked as 1460035.


Workaround:

Disable ICAP redirect service otherwise there are no viable workarounds
for this issue.


Implementation:
Software releases or updates are available for download at
https://www.juniper.net/support/downloads/.

Modification History:

​2020-07-08: Initial publication

CVSS Score:
9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Severity Level:
Critical

Severity Assessment:
Information for how Juniper Networks uses CVSS can be found at KB 16446
"Common Vulnerability Scoring System (CVSS) and Juniper's Security
Advisories."

_____________________________________________________________________



2020-07 Security Bulletin: Junos OS and Junos OS Evolved: RPD crash due
to specific BGP UPDATE packets (CVE-2020-1644)


Product Affected:
This issue affects Junos OS 17.2X75, 17.3, 17.4, 18.1, 18.2, 18.2X75,
18.3, 18.4, 19.1, 19.2, 19.3, 19.4. This issue affects Junos OS Evolved
19.2-EVO, 19.3-EVO, 19.4-EVO, 20.1-EVO.


Problem:

On Juniper Networks Junos OS and Junos OS Evolved devices, the receipt
of a specific BGP UPDATE packet causes an internal counter to be
incremented incorrectly, which over time can lead to the routing
protocols process (RPD) crash and restart.

This issue affects both IBGP and EBGP multihop deployment in IPv4 or
IPv6 network.

This issue affects:

Juniper Networks Junos OS:

17.2X75 versions prior to 17.2X75-D105.19;

17.3 versions prior to 17.3R3-S8;

17.4 versions prior to 17.4R2-S10, 17.4R3-S2;

18.1 versions prior to 18.1R3-S10;

18.2 versions prior to 18.2R2-S7, 18.2R3-S4;

18.2X75 versions prior to 18.2X75-D13, 18.2X75-D411.1, 18.2X75-D420.18,
18.2X75-D52.3, 18.2X75-D60;

18.3 versions prior to 18.3R2-S4, 18.3R3-S2;

18.4 versions prior to 18.4R1-S7, 18.4R2-S4, 18.4R3-S2;

19.1 versions prior to 19.1R1-S5, 19.1R2-S1, 19.1R3;

19.2 versions prior to 19.2R1-S5, 19.2R2;

19.3 versions prior to 19.3R2-S2, 19.3R3;

19.4 versions prior to 19.4R1-S2, 19.4R2.

Juniper Networks Junos OS Evolved: any releases prior to 20.1R2-EVO.

This issue does not affect Juniper Networks Junos OS releases prior to
17.3R1.

Juniper SIRT is not aware of any malicious exploitation of this
vulnerability.

This issue was seen during production usage.

This issue has been assigned CVE-2020-1644.


Solution:

The following software releases have been updated to resolve this
specific issue:

Junos OS: 17.2X75-D105.19, 17.3R3-S8, 17.4R2-S10, 17.4R3-S2, 18.1R3-S10,
18.2R2-S7, 18.2R3-S4, 18.2X75-D13, 18.2X75-D411.1, 18.2X75-D420.18,
18.2X75-D52.3, 18.2X75-D60, 18.3R2-S4, 18.3R3-S2, 18.4R1-S7, 18.4R2-S4,
18.4R3-S2, 19.1R1-S5, 19.1R2-S1, 19.1R3, 19.2R1-S5, 19.2R2, 19.3R2-S2,
19.3R3, 19.4R1-S2, 19.4R2, 20.1R1 and all subsequent releases.

Junos OS Evolved: 20.1R2-EVO, 20.2R1-EVO and all subsequent releases.

This issue is being tracked as 1481641.


Workaround:

There are no available workarounds for this issue.


Implementation:
Software releases or updates are available for download at
https://www.juniper.net/support/downloads/.


Modification History:

​2020-07-08: Initial publication


CVSS Score:
7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Severity Level:
High

Severity Assessment:
Information for how Juniper Networks uses CVSS can be found at KB 16446
"Common Vulnerability Scoring System (CVSS) and Juniper's Security
Advisories."

_____________________________________________________________________



2020-07 Security Bulletin: Junos OS: MX Series: Services card might
restart when DNS filtering is enabled (CVE-2020-1645)


Product Affected:
This issue affects Junos OS 17.3, 18.3, 18.4, 19.1, 19.2, 19.3, 19.4.
Affected platforms: MX Series.


Problem:

When DNS filtering is enabled on Juniper Networks Junos MX Series with
one of the following cards MS-PIC, MS-MIC or MS-MPC, an incoming stream
of packets processed by the Multiservices PIC Management Daemon
(mspmand) process, responsible for managing "URL Filtering service", may
crash, causing the Services PIC to restart. While the Services PIC is
restarting, all PIC services including DNS filtering service (DNS sink
holing) will be bypassed until the Services PIC completes its boot
process.

If the issue occurs, system core-dumps output will show a crash of
mspmand process:
root@device> show system core-dumps
-rw-rw---- 1 nobody wheel 575685123 <Date> /var/tmp/pics/mspmand.core.<*>.gz


This issue affects Juniper Networks Junos OS:

17.3 versions prior to 17.3R3-S8;

18.3 versions prior to 18.3R2-S4, 18.3R3-S1;

18.4 versions prior to 18.4R2-S5, 18.4R3;

19.1 versions prior to 19.1R2-S2, 19.1R3;

19.2 versions prior to 19.2R1-S5, 19.2R2;

19.3 versions prior to 19.3R2-S3, 19.3R3;

19.4 versions prior to 19.4R1-S3, 19.4R2.

This issue does not affect Juniper Networks Junos OS releases prior to
17.3R2.

The example of the configuration stanza affected by this issue is as
follows:
[services service-set <SERVICE-SET-NAME>]
user@host# set web-filter-profile <PROFILE_NAME>

used in combination with:
[services web-filter profile <PROFILE_NAME>]
user@host# set dns-filter-template <TEMPLATE_NAME>


Juniper SIRT is not aware of any malicious exploitation of this
vulnerability.

This issue was seen during production usage.

This issue has been assigned CVE-2020-1645.


Solution:

The following software releases have been updated to resolve this
specific issue: 18.3R2-S4, 18.3R3-S1, 18.4R2-S5, 18.4R3, 19.1R2-S2,
19.1R3, 19.2R1-S5, 19.2R2, 19.3R2-S3, 19.3R3, 19.4R1-S3, 19.4R2, 20.1R1,
and all subsequent releases.

This issue is being tracked as 1474056.


Workaround:
There are no viable workarounds for this issue.


Implementation:
Software release Service Packages are available at
http://support.juniper.net from the "Download Software" links.


Modification History:

2020-07-08: Initial Publication.

CVSS Score:
8.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L)

Severity Level:
High


Severity Assessment:
Information for how Juniper Networks uses CVSS can be found at KB 16446
"Common Vulnerability Scoring System (CVSS) and Juniper's Security
Advisories."

_____________________________________________________________________



2020-07 Security Bulletin: Junos OS: A race condition on receipt of
crafted LLDP packets leads to a memory leak and an LLDP crash.
(CVE-2020-1641)


Product Affected:
This issue affects Junos OS 12.3, 12.3X48, 15.1, 15.1X49, 15.1X53, 16.1,
17.1, 17.2, 17.3, 17.4, 18.1, 18.2, 18.2X75, 18.3, 18.4, 19.1.


Problem:

A Race Condition vulnerability in Juniper Networks Junos OS LLDP
implementation allows an attacker to cause LLDP to crash leading to a
Denial of Service (DoS). This issue occurs when crafted LLDP packets are
received by the device from an adjacent device. Multiple LACP flaps will
occur after LLDP crashes.

An indicator of compromise is to evaluate log file details for lldp with
RLIMIT.

Intervention should occur before 85% threshold of used KB versus maximum
available KB memory is reached.

show log messages | match RLIMIT | match lldp | last 20

Matching statement is " /kernel: %KERNEL-[number]: Process ([pid
#],lldpd) has exceeded 85% of RLIMIT_DATA: " with [] as variable data to
evaluate for.

This issue affects:

Juniper Networks Junos OS:

12.3 versions prior to 12.3R12-S15;

12.3X48 versions prior to 12.3X48-D95;

15.1 versions prior to 15.1R7-S6;

15.1X49 versions prior to 15.1X49-D200;

15.1X53 versions prior to 15.1X53-D593;

16.1 versions prior to 16.1R7-S7;

17.1 versions prior to 17.1R2-S11, 17.1R3-S2;

17.2 versions prior to 17.2R1-S9, 17.2R3-S3;

17.3 versions prior to 17.3R2-S5, 17.3R3-S6;

17.4 versions prior to 17.4R2-S4, 17.4R3;

18.1 versions prior to 18.1R3-S5;

18.2 versions prior to 18.2R2-S7, 18.2R3;

18.2X75 versions prior to 18.2X75-D12, 18.2X75-D33, 18.2X75-D50,
18.2X75-D420;

18.3 versions prior to 18.3R1-S7, 18.3R2-S3, 18.3R3;

18.4 versions prior to 18.4R1-S5, 18.4R2;

19.1 versions prior to 19.1R1-S4, 19.1R2.

The following minimal configuration is required:
[protocols lldp]

Juniper SIRT is not aware of any malicious exploitation of this
vulnerability.

This issue was seen during production usage.

This issue has been assigned CVE-2020-1641.


Solution:

The following software releases have been updated to resolve this
specific issue: 12.3R12-S15, 12.3X48-D95, 15.1R7-S6, 15.1X49-D200,
15.1X53-D593, 16.1R7-S7, 16.1R7-S7, 17.1R2-S11, 17.1R3-S2, 17.2R1-S9,
17.2R3-S3, 17.3R2-S5, 17.3R3-S6, 17.4R2-S4, 17.4R3, 18.1R3-S5, 18.2R2-
S7, 18.2R3, 18.2X75-D33, 18.2X75-D50, 18.2X75-D420, 18.3R1-S7, 18.3R2-
S3, 18.3R3, 18.4R1-S5, 18.4R2, 19.1R1-S4, 19.1R2, 19.2R1, and all
subsequent releases.

This issue is being tracked as 1410239.


Workaround:

Customers may disable LLDP "protocol lldp" or apply firewall filters to
block LLDP traffic on ingress interfaces.

There are no other known workarounds.

Implementation:
Software release Service Packages are available at
http://support.juniper.net from the "Download Software" links.


Modification History:

​2020-07-08: Initial publication

CVSS Score:
6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Severity Level:
Medium

Severity Assessment:
Information for how Juniper Networks uses CVSS can be found at KB 16446
"Common Vulnerability Scoring System (CVSS) and Juniper's Security
Advisories."

_____________________________________________________________________



2020-07 Security Bulletin: Junos OS: NFX150: Multiple vulnerabilities in
BIOS firmware (INTEL-SA-00241)


Product Affected:
These issues affect all versions of Junos OS running on the NFX150


Problem:

Potential security vulnerabilities in Intel firmware, used in the NFX150
network services platform, may allow escalation of privilege, denial of
service or information disclosure. Intel has released firmware updates
to mitigate these potential vulnerabilities.

This issue affects Juniper Networks Junos OS:

    all versions prior to 19.4R2;
    20.1 versions prior to 20.1R2.


Juniper SIRT is not aware of any malicious exploitation of this
vulnerability.

This issue was discovered during an external security research.

Vulnerability Details:


CVE 	CVSS 	Summary

CVE-2019-0169 	8.8 	Heap overflow in subsystem in Intel(R) CSME
before versions 11.8.70, 11.11.70, 11.22.70, 12.0.45; Intel(R) TXE
before versions 3.1.70 and 4.0.20 may allow an unauthenticated user to
potentially enable escalation of privileges, information disclosure or
denial of service via adjacent access.

CVE-2019-11132 	8.4 	Cross site scripting in subsystem in Intel(R)
AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow a
privileged user to potentially enable escalation of privilege via
network access.

CVE-2019-11147 	7.8 	Insufficient access control in hardware
abstraction driver for MEInfo software for Intel(R) CSME before versions
11.8.70, 11.11.70, 11.22.70, 12.0.45, 13.0.0, 14.0.10; TXEInfo software
for Intel(R) TXE before versions 3.1.70 and 4.0.20; INTEL-SA-00086
Detection Tool version 1.2.7.0 or before; INTEL-SA-00125 Detection Tool
version 1.0.45.0 or before may allow an authenticated user to
potentially enable escalation of privilege via local access.

CVE-2019-11105 	6.7 	Logic issue in subsystem for Intel(R) CSME
before versions 12.0.45, 13.0.10 and 14.0.10 may allow a privileged user
to potentially enable escalation of privilege and information disclosure
via local access.

CVE-2019-11088 	8.8 	Insufficient input validation in subsystem in
Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may
allow an unauthenticated user to potentially enable escalation of
privilege via adjacent access.

CVE-2019-11131 	9.8 	Logic issue in subsystem in Intel(R) AMT before
versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an
unauthenticated user to potentially enable escalation of privilege via
network access.

CVE-2019-11104 	7.8 	Insufficient input validation in MEInfo software
for Intel(R) CSME before versions 11.8.70, 11.11.70, 11.22.70, 12.0.45,
13.0.10 and 14.0.10; Intel(R) TXE before versions 3.1.70 and 4.0.20 may
allow an authenticated user to potentially enable escalation of
privilege via local access.

CVE-2019-11097 	7.8 	Improper directory permissions in the installer
for Intel(R) Management Engine Consumer Driver for Windows before
versions 11.8.70, 11.11.70, 11.22.70, 12.0.45,13.0.10 and 14.0.10;
Intel(R) TXE before versions 3.1.70 and 4.0.20 may allow an
authenticated user to potentially enable escalation of privilege via
local access.

CVE-2019-11103 	7.8 	Insufficient input validation in firmware update
software for Intel(R) CSME before versions 12.0.45,13.0.10 and 14.0.10
may allow an authenticated user to potentially enable escalation of
privilege via local access.

CVE-2019-0131 	8.1 	Insufficient input validation in subsystem in
Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may
allow an unauthenticated user to potentially enable denial of service or
information disclosure via adjacent access.

CVE-2019-11090 	5.9 	Cryptographic timing conditions in the subsystem
for Intel(R) PTT before versions 11.8.70, 11.11.70, 11.22.70, 12.0.45,
13.0.0 and 14.0.10; Intel(R) TXE 3.1.70 and 4.0.20; Intel(R) SPS before
versions SPS_E5_04.01.04.305.0, SPS_SoC-X_04.00.04.108.0, SPS_SoC-
A_04.00.04.191.0, SPS_E3_04.01.04.086.0, SPS_E3_04.08.04.047.0 may allow
an unauthenticated user to potentially enable information disclosure via
network access.

CVE-2019-0165 	4.4 	Insufficient Input validation in the subsystem
for Intel(R) CSME before versions 12.0.45,13.0.10 and 14.0.10 may allow
a privileged user to potentially enable denial of service via local
access.

CVE-2019-0166 	7.5 	Insufficient input validation in the subsystem
for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45
may allow an unauthenticated user to potentially enable information
disclosure via network access.

CVE-2019-0168 	4.4 	Insufficient input validation in the subsystem
for Intel(R) CSME before versions 11.8.70, 12.0.45 and 13.0.10; Intel(R)
TXE before versions 3.1.70 and 4.0.20 may allow a privileged user to
potentially enable information disclosure via local access.

CVE-2019-11087 	6.7 	Insufficient input validation in the subsystem
for Intel(R) CSME before versions 11.8.70, 11.11.70, 11.22.70, 12.0.45,
13.0.10 and 14.0.10; Intel(R) TXE before versions 3.1.70 and 4.0.20 may
allow a privileged user to potentially enable escalation of privilege,
information disclosure or denial of service via local access.

CVE-2019-11101 	4.4 	Insufficient input validation in the subsystem
for Intel(R) CSME before versions 11.8.70, 11.11.70, 11.22.70, 12.0.45,
13.0.10 and 14.0.10; Intel(R) TXE before versions 3.1.70 and 4.0.20 may
allow a privileged user to potentially enable information disclosure via
local access.

CVE-2019-11100 	4.6 	Insufficient input validation in the subsystem
for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45
may allow an unauthenticated user to potentially enable information
disclosure via physical access.

CVE-2019-11102 	4.4 	Insufficient input validation in Intel(R) DAL
software for Intel(R) CSME before versions 11.8.70, 11.11.70, 11.22.70,
12.0.45, 13.0.10 and 14.0.10; Intel(R) TXE before versions 3.1.70 and
4.0.20 may allow a privileged user to potentially enable information
disclosure via local access.

CVE-2019-11106 	6.7 	Insufficient session validation in the subsystem
for Intel(R) CSME before versions 11.8.70, 12.0.45, 13.0.10 and 14.0.10;
Intel(R) TXE before versions 3.1.70 and 4.0.20 may allow a privileged
user to potentially enable escalation of privilege via local access.

CVE-2019-11107 	9.8 	Insufficient input validation in the subsystem
for Intel(R) AMT before version 12.0.45 may allow an unauthenticated
user to potentially enable escalation of privilege via network access.

CVE-2019-11109 	4.4 	Logic issue in the subsystem for Intel(R) SPS
before versions SPS_E5_04.01.04.275.0, SPS_SoC-X_04.00.04.100.0 and
SPS_SoC-A_04.00.04.191.0 may allow a privileged user to potentially
enable denial of service via local access.

CVE-2019-11110 	6.7 	Authentication bypass in the subsystem for
Intel(R) CSME before versions 11.8.70, 11.11.70, 11.22.70, 12.0.45,
13.0.10 and 14.0.10; Intel(R) TXE before versions 3.1.70 and 4.0.20 may
allow a privileged user to potentially enable escalation of privilege
via local access.

CVE-2019-11086 	6.8 	Insufficient input validation in subsystem for
Intel(R) AMT before version 12.0.45 may allow an unauthenticated user to
potentially enable escalation of privilege via physical access.

CVE-2019-11108 	6.7 	Insufficient input validation in subsystem for
Intel(R) CSME before versions 12.0.45 and 13.0.10 may allow a privileged
user to potentially enable escalation of privilege via local access.


Solution:
The following software releases have been updated to include updated
BIOS firmware: Junos OS 19.4R2, 20.1R2, 20.2R1, and all subsequent
releases.

This issue is being tracked as 1480976.


Workaround:
There are no known workarounds for this issue.

Implementation:
Software Releases, patches and updates are available at
https://www.juniper.net/support/downloads/.


Modification History:

​2020-07-08: Initial Publication


CVSS Score:
9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)


Severity Level:
Critical


Severity Assessment:
Information for how Juniper Networks uses CVSS can be found at KB 16446
"Common Vulnerability Scoring System (CVSS) and Juniper's Security
Advisories."

_____________________________________________________________________


2020-07 Security Bulletin: Junos OS and Junos OS Evolved: OpenSSL
Security Advisory [20 Dec 2019]


Product Affected:
This issue affects Junos OS 15.1, 15.1X49, 15.1X53, 16.1, 17.2, 17.3,
17.4, 18.1, 18.2, 18.2X75, 18.3, 18.4, 19.1, 19.2, 19.3, 19.4. This
issue affects Junos OS Evolved 19.1, 19.2, 19.3, 19.4.


Problem:
The ​OpenSSL project has published a security advisory for a
vulnerability resolved in the OpenSSL library on December 20, 2019.

This issue affects:

Juniper Networks Junos OS:

    15.1 versions prior to 15.1R7-S7;
    15.1X49 versions prior to 15.1X49-D230;
    15.1X53 versions prior to 15.1X53-D593;
    16.1 versions prior to 16.1R7-S8;
    17.2 versions prior to 17.2R3-S4;
    17.3 versions prior to 17.3R3-S8;
    17.4 versions prior to 17.4R2-S10, 17.4R3-S1;
    18.1 versions prior to 18.1R3-S10;
    18.2 versions prior to 18.2R2-S7, 18.2R3-S4;
    18.2X75 versions prior to 18.2X75-D60;
    18.3 versions prior to 18.3R1-S7, 18.3R2-S4, 18.3R3-S2;
    18.4 versions prior to 18.4R2-S4, 18.4R3-S1;
    19.1 versions prior to 19.1R1-S5, 19.1R2-S1, 19.1R3;
    19.2 versions prior to 19.2R1-S4, 19.2R2;
    19.3 versions prior to 19.3R2-S2, 19.3R3;
    19.4 versions prior to 19.4R1-S1, 19.4R2.


Juniper Networks Junos OS Evolved:

    19.1 versions prior to 19.1R3-EVO
    19.2 versions prior to 19.2R2-EVO;
    19.3 versions prior to 19.3R3-EVO;
    19.4 versions prior to 19.4R2-EVO.


Juniper SIRT is not aware of any malicious exploitation of this
vulnerability.

This issue was discovered during an external security research.

The important security issue resolved is described below:

CVE 	CVSS 	Summary

CVE-2019-1551 	5.3 	There is an overflow bug in the x64_64
Montgomery squaring procedure used in exponentiation with 512-bit
moduli. No EC algorithms are affected. Analysis suggests that attacks
against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of
this defect would be very difficult to perform and are not believed
likely. Attacks against DH512 are considered just feasible. However, for
an attack the target would have to re-use the DH512 private key, which
is not recommended anyway. Also applications directly using the low
level API BN_mod_exp may be affected if they use BN_FLG_CONSTTIME. Fixed
in OpenSSL 1.1.1e (Affected 1.1.1-1.1.1d). Fixed in OpenSSL 1.0.2u
(Affected 1.0.2-1.0.2t).

Solution:
The following software releases have been updated to resolve this
specific issue:

Junos OS: 15.1R7-S7, 15.1X49-D230, 15.1X53-D593, 16.1R7-S8, 17.2R3-S4,
17.3R3-S8, 17.4R2-S10, 17.4R3-S1, 18.1R3-S10, 18.2R2-S7, 18.2R3-S4,
18.2X75-D60, 18.3R1-S7, 18.3R2-S4, 18.3R3-S2, 18.4R2-S4, 18.4R3-S1,
19.1R1-S5, 19.1R2-S1, 19.1R3, 19.2R1-S4, 19.2R2, 19.3R2-S2, 19.3R3,
19.4R1-S1, 19.4R2, 20.1R1, and all subsequent releases.

Junos OS Evolved: 19.1R3-EVO,19.2R2-EVO, 19.3R3-EVO, 19.4R2-EVO,
20.1R1-EVO, and all subsequent releases.

This issue is being tracked as 1479780 and 1485711.


Workaround:

Since SSL is used for remote network configuration and management
applications such as J-Web and SSL Service for JUNOScript (XNM-SSL),
viable workarounds for this issue in Junos may include:

    Disabling J-Web
    Disable SSL service for JUNOScript and only use Netconf, which makes
use of SSH, to make configuration changes
    Limit access to J-Web and XNM-SSL from only trusted networks


In addition to the recommendations listed above, it is good security
practice to limit the exploitable attack surface of critical
infrastructure networking equipment. Use access lists or firewall
filters to limit access to the router via SSL only from trusted,
administrative networks or hosts.


Implementation:
Software Releases, patches and updates are available at
https://www.juniper.net/support/downloads/.


Modification History:

​2020-07-08: Initial Publication


CVSS Score:
5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)


Severity Level:
Medium

Severity Assessment:
Information for how Juniper Networks uses CVSS can be found at KB 16446
"Common Vulnerability Scoring System (CVSS) and Juniper's Security
Advisories."

_____________________________________________________________________


2020-07 Security Bulletin: Junos OS: Receipt of certain genuine BGP
packets from any BGP Speaker causes RPD to crash. (CVE-2020-1640)


Product Affected:
This issue affects Junos OS 16.1, 16.2, 17.1, 17.2, 17.3, 17.4, 18.1,
18.2, 18.2X75, 18.3, 18.4, 19.1, 19.2, 19.3, 19.4, 20.1.


Problem:

An improper use of a validation framework when processing incoming
genuine BGP packets within Juniper Networks RPD (routing protocols
process) daemon allows an attacker to crash RPD thereby causing a Denial
of Service (DoS) condition. This framework requires these packets to be
passed. By continuously sending any of these types of formatted genuine
packets, an attacker can repeatedly crash the RPD process causing a
sustained Denial of Service.

This issue can be initiated or propagated through eBGP and iBGP and can
impact devices in either modes of use as long as the devices are
configured to support the compromised framework and a BGP path is
activated or active.

This issue affects:

Juniper Networks Junos OS

16.1 versions 16.1R7-S6 and later versions prior to 16.1R7-S8;

17.3 versions 17.3R2-S5, 17.3R3-S6 and later versions prior to
17.3R3-S8;

17.4 versions 17.4R2-S7, 17.4R3 and later versions prior to 17.4R2-S11,
17.4R3-S2;

18.1 versions 18.1R3-S7 and later versions prior to 18.1R3-S10;

18.2 versions 18.2R2-S6, 18.2R3-S2 and later versions prior to 18.2R2-
S7, 18.2R3-S5;

18.2X75 versions 18.2X75-D12, 18.2X75-D32, 18.2X75-D33, 18.2X75-D51,
18.2X75-D60, 18.2X75-D411, 18.2X75-D420 and later versions prior to
18.2X75-D32, 18.2X75-D33, 18.2X75-D420, 18.2X75-D52, 18.2X75-D60,
18.2X75-D65, 18.2X75-D70;(*1)

18.3 versions 18.3R1-S6, 18.3R2-S3, 18.3R3 and later versions prior to
18.3R2-S4, 18.3R3-S2;

18.4 versions 18.4R1-S5, 18.4R2-S4, 18.4R3 and later versions prior to
18.4R1-S7, 18.4R2-S5, 18.4R3-S3(*2);

19.1 versions 19.1R1-S3, 19.1R2 and later versions prior to 19.1R1-S5,
19.1R2-S2, 19.1R3-S2;

19.2 versions 19.2R1-S2, 19.2R2 and later versions prior to 19.2R1-S5,
19.2R2, 19.2R3;

19.3 versions prior to 19.3R2-S3, 19.3R3;

19.4 versions prior to 19.4R1-S2, 19.4R2, 19.4R3;

20.1 versions prior to 20.1R1-S1, 20.1R2.

This issue does not affect Junos OS prior to 16.1R1.

This issue affects IPv4 and IPv6 traffic.

Juniper SIRT is not aware of any malicious exploitation of this
vulnerability.

This issue was seen during production usage.

This issue has been assigned CVE-2020-1640.


Solution:

 The following software releases have been updated to resolve this
specific issue: 16.1R7-S8, 17.3R3-S8, 17.4R2-S11, 17.4R3-S2, 18.1R3-S10,
18.2R2-S7, 18.2R3-S5, 18.2X75-D32, 18.2X75-D33, 18.2X75-D420, 18.2X75-
D52, 18.2X75-D60, 18.2X75-D65, 18.2X75-D70;(*1), 18.3R2-S4, 18.3R3-S2,
18.4R1-S7, 18.4R2-S5, 18.4R3-S3(*2), 19.1R1-S5, 19.1R2-S2, 19.1R3-S2,
19.2R1-S5, 19.2R2, 19.2R3, 19.3R2-S3, 19.3R3, 19.4R1-S2, 19.4R2, 19.4R3,
20.1R1-S1, 20.1R2, 20.2R1, and subsequent releases.

*1: For 18.2X75 customers. Please speak with your account manager
regarding applicable respin release identifiers for affected-to to
affected-from, and resolved-in release targets.

*2: Pending publication.

This issue is being tracked as 1497721.


Workaround:
There are no available workarounds for this issue.

Implementation:
Software Releases, patches and updates are available at
https://www.juniper.net/support/downloads/.


Modification History:

2020-07-08: Initial Publication.


CVSS Score:
7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)


Severity Level:
High


Severity Assessment:
Information for how Juniper Networks uses CVSS can be found at KB 16446
"Common Vulnerability Scoring System (CVSS) and Juniper's Security
Advisories."

_____________________________________________________________________


2020-07 Security Bulletin: Junos OS: RPD crash when executing specific
"show ospf interface" commands from the CLI with OSPF authentication
configured (CVE-2020-1643)


Product Affected:
This issue affects Junos OS 12.3X48, 14.1X53, 15.1, 15.1X49, 15.1X53,
16.1, 17.1, 17.2, 17.3, 17.4, 18.1, 18.2, 18.2X75, 18.3.


Problem:

Execution of the "show ospf interface extensive" or "show ospf interface
detail" CLI commands on a Juniper Networks device running Junos OS may
cause the routing protocols process (RPD) to crash and restart if OSPF
interface authentication is configured, leading to a Denial of Service
(DoS). By continuously executing the same CLI commands, a local attacker
can repeatedly crash the RPD process causing a sustained Denial of
Service.

Note: Only systems utilizing ARM processors are vulnerable to this
issue.  Systems shipped with PowerPC processors, such as the MX80, are
not vulnerable to this issue.  The processor architecture can be
displayed via the 'uname -a' command.  For example:

ARM (vulnerable):
% uname -a | awk '{print $NF}'
arm

PowerPC (not vulnerable):
% uname -a | awk '{print $NF}'
powerpc

This issue affects Juniper Networks Junos OS:

    12.3X48 versions prior to 12.3X48-D100;
    14.1X53 versions prior to 14.1X53-D140, 14.1X53-D54;
    15.1 versions prior to 15.1R7-S7;
    15.1X49 versions prior to 15.1X49-D210;
    15.1X53 versions prior to 15.1X53-D593;
    16.1 versions prior to 16.1R7-S8;
    17.1 versions prior to 17.1R2-S12;
    17.2 versions prior to 17.2R3-S4;
    17.3 versions prior to 17.3R3-S8;
    17.4 versions prior to 17.4R2-S2, 17.4R3;
    18.1 versions prior to 18.1R3-S2;
    18.2 versions prior to 18.2R2, 18.2R3;
    18.2X75 versions prior to 18.2X75-D40;
    18.3 versions prior to 18.3R1-S2, 18.3R2.


An example of a vulnerable configuration with OSPF authentication
enabled is shown below:
area 0.0.0.0 {
    interface ae0.0 {
        authentication {
            md5 0 key "$9$XyZzYxYzZyXyZzYxYzZy"; ## SECRET-DATA
        }
    }
}


Juniper SIRT is not aware of any malicious exploitation of this
vulnerability.

This issue was seen during production usage.

This issue has been assigned CVE-2020-1643.


Solution:

The following software releases have been updated to resolve this
specific issue: Junos OS 12.3X48-D100, 14.1X53-D140, 14.1X53-D54,
15.1R7-S7, 15.1X49-D210, 15.1X53-D593, 16.1R7-S8, 17.1R2-S12, 17.2R3-S4,
17.3R3-S8, 17.4R2-S2, 17.4R3, 18.1R3-S2, 18.2R2, 18.2X75-D40, 18.3R1-S2,
18.3R2, 18.4R1, and all subsequent releases.

This issue is being tracked as 1385014.


Workaround:

Limit access to the Junos CLI and shell to only trusted administrators.

Restrict access to "show ospf interface extensive" or "show ospf
interface detail" via command authorization until an upgrade can be
performed.


Implementation:
Software releases or updates are available for download at
https://www.juniper.net/support/downloads/.


Modification History:

​2020-07-08: Initial publication


CVSS Score:
5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)


Severity Level:
Medium


Severity Assessment:
Information for how Juniper Networks uses CVSS can be found at KB 16446
"Common Vulnerability Scoring System (CVSS) and Juniper's Security
Advisories."
_____________________________________________________________________


2020-07 Security Bulletin: Junos Space and Junos Space Security
Director: Multiple vulnerabilities resolved in 20.1R1 release


Product Affected:
This issue affects Junos Space. This issue affects Junos Space Security
Director.


Problem:

Multiple vulnerabilities have been resolved in the Junos Space and Junos
Space Security Director 20.1R1 release by updating third party software
included with Junos Space and Junos Space Security Director or by fixing
vulnerabilities found during internal testing.

These issues affect:

Juniper Networks Junos Space and Junos Space Security Director versions
prior to 20.1R1.

These issue affects:

Juniper Networks Junos Space versions prior to 20.1R1.

Juniper Networks Junos Space Security Director versions prior to 20.1R1.

This issues were discovered during an external security research.

Important security issues resolved include:

CVE 	CVSS 	Summary

CVE-2018-3639 	5.5 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) 	
Systems with microprocessors utilizing speculative execution and
speculative execution of memory reads before the addresses of all prior
memory writes are known may allow unauthorized disclosure of information
to an attacker with local user access via a side-channel analysis, aka
Speculative Store Bypass (SSB), Variant 4.

CVE-2019-0211 	7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 	
In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event,
worker or prefork, code executing in less-privileged child processes or
threads (including scripts executed by an in-process scripting
interpreter) could execute arbitrary code with the privileges of the
parent process (usually root) by manipulating the scoreboard. Non-Unix
systems are not affected.

CVE-2014-3215 	6.9 AV:L/AC:M/Au:N/C:C/I:C/A:C 	seunshare in
policycoreutils 2.2.5 is owned by root with 4755 permissions, and
executes programs in a way that changes the relationship between the
setuid system call and the getresuid saved set-user-ID value, which
makes it easier for local users to gain privileges by leveraging a
program that mistakenly expected that it could permanently drop
privileges.

CVE-2014-3690 	4.9 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 	
arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before
3.17.2 on Intel processors does not ensure that the value in the CR4
control register remains the same after a VM entry, which allows host OS
users to kill arbitrary processes or cause a denial of service (system
disruption) by leveraging /dev/kvm access, as demonstrated by PR_SET_TSC
prctl calls within a modified copy of QEMU.

CVE-2014-7825 	4.9 (AV:L/AC:L/Au:N/C:N/I:N/A:C) 	
kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2 does
not properly handle private syscall numbers during use of the perf
subsystem, which allows local users to cause a denial of service (out-
of-bounds read and OOPS) or bypass the ASLR protection mechanism via a
crafted application.

CVE-2014-7826 	4.6 (AV:L/AC:L/Au:N/C:P/I:P/A:P) 	
kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2 does
not properly handle private syscall numbers during use of the ftrace
subsystem, which allows local users to gain privileges or cause a denial
of service (invalid pointer dereference) via a crafted application.

CVE-2014-8171 	5.5 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) 	
The memory resource controller (aka memcg) in the Linux kernel allows
local users to cause a denial of service (deadlock) by spawning new
processes within a memory-constrained cgroup.

CVE-2014-8884 	6.1 (AV:L/AC:L/Au:N/C:P/I:P/A:C) 	Stack-based
buffer overflow in the ttusbdecfe_dvbs_diseqc_send_master_cmd function
in drivers/media/usb/ttusb-dec/ttusbdecfe.c in the Linux kernel before
3.17.4 allows local users to cause a denial of service (system crash) or
possibly gain privileges via a large message length in an ioctl call.

CVE-2014-9529 	6.9 AV:L/AC:M/Au:N/C:C/I:C/A:C 	Race condition in the
key_gc_unused_keys function in security/keys/gc.c in the Linux kernel
through 3.18.2 allows local users to cause a denial of service (memory
corruption or panic) or possibly have unspecified other impact via
keyctl commands that trigger access to a key structure member during
garbage collection of a key.

CVE-2014-9584 	2.1 AV:L/AC:L/Au:N/C:P/I:N/A:N 	The
parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux
kernel before 3.18.2 does not validate a length value in the Extensions
Reference (ER) System Use Field, which allows local users to obtain
sensitive information from kernel memory via a crafted iso9660 image.

CVE-2014-9679 	6.8 AV:N/AC:M/Au:N/C:P/I:P/A:P 	Integer underflow in the
cupsRasterReadPixels function in filter/raster.c in CUPS before 2.0.2
allows remote attackers to have unspecified impact via a malformed
compressed raster file, which triggers a buffer overflow.

CVE-2015-1158 	10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 	The add_job
function in scheduler/ipp.c in cupsd in CUPS before 2.0.3 performs
incorrect free operations for multiple-value job-originating-host-name
attributes, which allows remote attackers to trigger data corruption for
reference-counted strings via a crafted (1) IPP_CREATE_JOB or (2)
IPP_PRINT_JOB request, as demonstrated by replacing the configuration
file and consequently executing arbitrary code.

CVE-2015-1159 	4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 	Cross-site
scripting (XSS) vulnerability in the cgi_puts function in cgi-
bin/template.c in the template engine in CUPS before 2.0.3 allows remote
attackers to inject arbitrary web script or HTML via the QUERY parameter
to help/.

CVE-2015-1421 	10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 	Use-after-free
vulnerability in the sctp_assoc_update function in net/sctp/associola.c
in the Linux kernel before 3.18.8 allows remote attackers to cause a
denial of service (slab corruption and panic) or possibly have
unspecified other impact by triggering an INIT collision that leads to
improper handling of shared-key data.

CVE-2015-7547 	8.1 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) 	
Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc
functions in the libresolv library in the GNU C Library (aka glibc or
libc6) before 2.23 allow remote attackers to cause a denial of service
(crash) or possibly execute arbitrary code via a crafted DNS response
that triggers a call to the getaddrinfo function with the AF_UNSPEC or
AF_INET6 address family, related to performing "dual A/AAAA DNS queries"
and the libnss_dns.so.2 NSS module.

CVE-2016-1762 	8.1 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H) 	
The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers
to cause a denial of service (heap-based buffer over-read) via a crafted
XML document.

CVE-2016-1833 	5.5 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) 	
The htmlCurrentChar function in libxml2 before 2.9.4, as used in Apple
iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS
before 2.2.1, allows remote attackers to cause a denial of service
(heap-based buffer over-read) via a crafted XML document.

CVE-2016-1834 	7.8 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 	
Heap-based buffer overflow in the xmlStrncat function in libxml2 before
2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS
before 9.2.1, and watchOS before 2.2.1, allows remote attackers to
execute arbitrary code or cause a denial of service (memory corruption)
via a crafted XML document.

CVE-2016-1835 	8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 	
Use-after-free vulnerability in the xmlSAX2AttributeNs function in
libxml2 before 2.9.4, as used in Apple iOS before 9.3.2 and OS X before
10.11.5, allows remote attackers to cause a denial of service via a
crafted XML document.

CVE-2016-1836 	5.5 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) 	
Use-after-free vulnerability in the xmlDictComputeFastKey function in
libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before
10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote
attackers to cause a denial of service via a crafted XML document.

CVE-2016-1837 	5.5 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) 	
Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral
and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used
in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and
watchOS before 2.2.1, allow remote attackers to cause a denial of
service via a crafted XML document.

CVE-2016-1838 	5.5 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) 	
The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4,
as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before
9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a
denial of service (heap-based buffer over-read) via a crafted XML
document.

CVE-2016-1839 	5.5 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) 	
The xmlDictAddString function in libxml2 before 2.9.4, as used in Apple
iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS
before 2.2.1, allows remote attackers to cause a denial of service
(heap-based buffer over-read) via a crafted XML document.

CVE-2016-1840 	7.8 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 	
Heap-based buffer overflow in the xmlFAParsePosCharGroup function in
libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before
10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote
attackers to execute arbitrary code or cause a denial of service (memory
corruption) via a crafted XML document.

CVE-2016-3627 	7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 	
The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and
earlier, when used in recovery mode, allows context-dependent attackers
to cause a denial of service (infinite recursion, stack consumption, and
application crash) via a crafted XML document.

CVE-2016-3705 	7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 	
The (1) xmlParserEntityCheck and (2) xmlParseAttValueComplex functions
in parser.c in libxml2 2.9.3 do not properly keep track of the recursion
depth, which allows context-dependent attackers to cause a denial of
service (stack consumption and application crash) via a crafted XML
document containing a large number of nested entity references.

CVE-2016-4447 	7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 	
The xmlParseElementDecl function in parser.c in libxml2 before 2.9.4
allows context-dependent attackers to cause a denial of service (heap-
based buffer underread and application crash) via a crafted file,
involving xmlParseName.

CVE-2016-4448 	10.0 AV:N/AC:L/Au:N/C:C/I:C/A:C 	Format string
vulnerability in libxml2 before 2.9.4 allows attackers to have
unspecified impact via format string specifiers in unknown vectors.

CVE-2016-4449 	7.1 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H) 	
XML external entity (XXE) vulnerability in the
xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.4,
when not in validating mode, allows context-dependent attackers to read
arbitrary files or cause a denial of service (resource consumption) via
unspecified vectors.

CVE-2016-5616 	  	** REJECT ** DO NOT USE THIS CANDIDATE NUMBER.
ConsultIDs: CVE-2016-6663. Reason: This candidate is a reservation
duplicate of CVE-2016-6663. Notes: All CVE users should reference
CVE-2016-6663 instead of this candidate. All references and descriptions
in this candidate have been removed to prevent accidental usage.

CVE-2016-6136 	4.7 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N) 	
Race condition in the audit_log_single_execve_arg function in
kernel/auditsc.c in the Linux kernel through 4.7 allows local users to
bypass intended character-set restrictions or disrupt system-call
auditing by changing a certain string, aka a "double fetch"
vulnerability.

CVE-2016-6662 	9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 	
Oracle MySQL through 5.5.52, 5.6.x through 5.6.33, and 5.7.x through
5.7.15; MariaDB before 5.5.51, 10.0.x before 10.0.27, and 10.1.x before
10.1.17; and Percona Server before 5.5.51-38.1, 5.6.x before
5.6.32-78.0, and 5.7.x before 5.7.14-7 allow local users to create
arbitrary configurations and bypass certain protection mechanisms by
setting general_log_file to a my.cnf configuration. NOTE: this can be
leveraged to execute arbitrary code with root privileges by setting
malloc_lib. NOTE: the affected MySQL version information is from
Oracle's October 2016 CPU. Oracle has not commented on third-party
claims that the issue was silently patched in MySQL 5.5.52, 5.6.33, and
5.7.15.

CVE-2016-6663 	7.0 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) 	
Race condition in Oracle MySQL before 5.5.52, 5.6.x before 5.6.33, 5.7.x
before 5.7.15, and 8.x before 8.0.1; MariaDB before 5.5.52, 10.0.x
before 10.0.28, and 10.1.x before 10.1.18; Percona Server before
5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and
Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17,
and 5.7.x before 5.7.14-26.17 allows local users with certain
permissions to gain privileges by leveraging use of my_copystat by
REPAIR TABLE to repair a MyISAM table.

CVE-2016-9555 	9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 	
The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel
before 4.8.8 lacks chunk-length checking for the first chunk, which
allows remote attackers to cause a denial of service (out-of-bounds slab
access) or possibly have unspecified other impact via crafted SCTP data.

CVE-2017-7895 	9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 	
The NFSv2 and NFSv3 server implementations in the Linux kernel through
4.10.13 lack certain checks for the end of a buffer, which allows remote
attackers to trigger pointer-arithmetic errors or possibly have
unspecified other impact via crafted requests, related to
fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.

CVE-2006-2193 	7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 	Buffer overflow
in the t2p_write_pdf_string function in tiff2pdf in libtiff 3.8.2 and
earlier allows attackers to cause a denial of service (crash) and
possibly execute arbitrary code via a TIFF file with a DocumentName tag
that contains UTF-8 characters, which triggers the overflow when a
character is sign extended to an integer that produces more digits than
expected in an sprintf call.

CVE-2006-2656 	7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 	Stack-based
buffer overflow in the tiffsplit command in libtiff 3.8.2 and earlier
might might allow attackers to execute arbitrary code via a long
filename. NOTE: tiffsplit is not setuid. If there is not a common
scenario under which tiffsplit is called with attacker-controlled
command line arguments, then perhaps this issue should not be included
in CVE.

CVE-2008-2327 	6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 	Multiple buffer
underflows in the (1) LZWDecode, (2) LZWDecodeCompat, and (3)
LZWDecodeVector functions in tif_lzw.c in the LZW decoder in LibTIFF
3.8.2 and earlier allow context-dependent attackers to execute arbitrary
code via a crafted TIFF file, related to improper handling of the
CODE_CLEAR code.

CVE-2009-2347 	9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 	Multiple integer
overflows in inter-color spaces conversion tools in libtiff 3.8 through
3.8.2, 3.9, and 4.0 allow context-dependent attackers to execute
arbitrary code via a TIFF image with large (1) width and (2) height
values, which triggers a heap-based buffer overflow in the (a)
cvt_whole_image function in tiff2rgba and (b) tiffcvt function in
rgb2ycbcr.

CVE-2009-5022 	6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 	Heap-based
buffer overflow in tif_ojpeg.c in the OJPEG decoder in LibTIFF before
3.9.5 allows remote attackers to execute arbitrary code via a crafted
TIFF file.

CVE-2010-1411 	6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 	Multiple integer
overflows in the Fax3SetupState function in tif_fax3.c in the FAX3
decoder in LibTIFF before 3.9.3, as used in ImageIO in Apple Mac OS X
10.5.8 and Mac OS X 10.6 before 10.6.4, allow remote attackers to
execute arbitrary code or cause a denial of service (application crash)
via a crafted TIFF file that triggers a heap-based buffer overflow.

CVE-2010-2065 	6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 	Integer overflow
in the TIFFroundup macro in LibTIFF before 3.9.3 allows remote attackers
to cause a denial of service (application crash) or possibly execute
arbitrary code via a crafted TIFF file that triggers a buffer overflow.

CVE-2010-2067 	6.8 AV:N/AC:M/Au:N/C:P/I:P/A:P 	Stack-based buffer
overflow in the TIFFFetchSubjectDistance function in tif_dirread.c in
LibTIFF before 3.9.4 allows remote attackers to cause a denial of
service (application crash) or possibly execute arbitrary code via a
long EXIF SubjectDistance field in a TIFF file.

CVE-2011-0192 	9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 	Buffer overflow
in Fax4Decode in LibTIFF 3.9.4 and possibly other versions, as used in
ImageIO in Apple iTunes before 10.2 on Windows and other products,
allows remote attackers to execute arbitrary code or cause a denial of
service (application crash) via a crafted TIFF Internet Fax image file
that has been compressed using CCITT Group 4 encoding, related to the
EXPAND2D macro in libtiff/tif_fax3.h. NOTE: some of these details are
obtained from third party information.

CVE-2011-1167 	6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 	Heap-based
buffer overflow in the thunder (aka ThunderScan) decoder in
tif_thunder.c in LibTIFF 3.9.4 and earlier allows remote attackers to
execute arbitrary code via crafted THUNDER_2BITDELTAS data in a .tiff
file that has an unexpected BitsPerSample value.

CVE-2012-1173 	6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 	Multiple integer
overflows in tiff_getimage.c in LibTIFF 3.9.4 allow remote attackers to
execute arbitrary code via a crafted tile size in a TIFF file, which is
not properly handled by the (1) gtTileSeparate or (2) gtStripSeparate
function, leading to a heap-based buffer overflow.

CVE-2012-2088 	7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 	Integer
signedness error in the TIFFReadDirectory function in tif_dirread.c in
libtiff 3.9.4 and earlier allows remote attackers to cause a denial of
service (application crash) and possibly execute arbitrary code via a
negative tile depth in a tiff image, which triggers an improper
conversion between signed and unsigned types, leading to a heap-based
buffer overflow.

CVE-2012-2113 	6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 	Multiple integer
overflows in tiff2pdf in libtiff before 4.0.2 allow remote attackers to
cause a denial of service (application crash) or possibly execute
arbitrary code via a crafted tiff image, which triggers a heap-based
buffer overflow.

CVE-2012-3401 	6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 	The
t2p_read_tiff_init function in tiff2pdf (tools/tiff2pdf.c) in LibTIFF
4.0.2 and earlier does not properly initialize the T2P context struct
pointer in certain error conditions, which allows context-dependent
attackers to cause a denial of service (crash) and possibly execute
arbitrary code via a crafted TIFF image that triggers a heap-based
buffer overflow.

CVE-2012-4447 	6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 	Heap-based
buffer overflow in tif_pixarlog.c in LibTIFF before 4.0.3 allows remote
attackers to cause a denial of service (application crash) and possibly
execute arbitrary code via a crafted TIFF image using the PixarLog
Compression format.

CVE-2012-4564 	6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 	ppm2tiff does
not check the return value of the TIFFScanlineSize function, which
allows remote attackers to cause a denial of service (crash) and
possibly execute arbitrary code via a crafted PPM image that triggers an
integer overflow, a zero-memory allocation, and a heap-based buffer
overflow.

CVE-2012-5581 	6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 	Stack-based
buffer overflow in tif_dir.c in LibTIFF before 4.0.2 allows remote
attackers to cause a denial of service (crash) and possibly execute
arbitrary code via a crafted DOTRANGE tag in a TIFF image.

CVE-2013-1960 	9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 	Heap-based
buffer overflow in the t2p_process_jpeg_strip function in tiff2pdf in
libtiff 4.0.3 and earlier allows remote attackers to cause a denial of
service (crash) and possibly execute arbitrary code via a crafted TIFF
image file.

CVE-2013-1961 	9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C) 	Stack-based
buffer overflow in the t2p_write_pdf_page function in tiff2pdf in
libtiff before 4.0.3 allows remote attackers to cause a denial of
service (application crash) via a crafted image length and resolution in
a TIFF image file.

CVE-2013-4232 	6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 	Use-after-free
vulnerability in the t2p_readwrite_pdf_image function in
tools/tiff2pdf.c in libtiff 4.0.3 allows remote attackers to cause a
denial of service (crash) or possibly execute arbitrary code via a
crafted TIFF image.

CVE-2013-4243 	6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 	Heap-based
buffer overflow in the readgifimage function in the gif2tiff tool in
libtiff 4.0.3 and earlier allows remote attackers to cause a denial of
service (crash) and possibly execute arbitrary code via a crafted height
and width values in a GIF image.

CVE-2013-4244 	6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 	The LZW
decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows
context-dependent attackers to cause a denial of service (out-of-bounds
write and crash) or possibly execute arbitrary code via a crafted GIF
image.

CVE-2016-3621 	8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 	
The LZWEncode function in tif_lzw.c in the bmp2tiff tool in LibTIFF
4.0.6 and earlier, when the "-c lzw" option is used, allows remote
attackers to cause a denial of service (buffer over-read) via a crafted
BMP image.

CVE-2016-3632 	7.8 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 	
The _TIFFVGetField function in tif_dirinfo.c in LibTIFF 4.0.6 and
earlier allows remote attackers to cause a denial of service (out-of-
bounds write) or execute arbitrary code via a crafted TIFF image.

CVE-2016-3945 	7.8 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 	
Multiple integer overflows in the (1) cvt_by_strip and (2) cvt_by_tile
functions in the tiff2rgba tool in LibTIFF 4.0.6 and earlier, when -b
mode is enabled, allow remote attackers to cause a denial of service
(crash) or execute arbitrary code via a crafted TIFF image, which
triggers an out-of-bounds write.

CVE-2016-3990 	7.8 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 	
Heap-based buffer overflow in the horizontalDifference8 function in
tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to
cause a denial of service (crash) or execute arbitrary code via a
crafted TIFF image to tiffcp.

CVE-2016-3991 	7.8 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 	
Heap-based buffer overflow in the loadImage function in the tiffcrop
tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a
denial of service (out-of-bounds write) or execute arbitrary code via a
crafted TIFF image with zero tiles.

CVE-2016-5314 	8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 	
Buffer overflow in the PixarLogDecode function in tif_pixarlog.c in
LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of
service (application crash) or possibly have unspecified other impact
via a crafted TIFF image, as demonstrated by overwriting the vgetparent
function pointer with rgb2ycbcr.

CVE-2017-9935 	8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 	
In LibTIFF 4.0.8, there is a heap-based buffer overflow in the
t2p_write_pdf function in tools/tiff2pdf.c. This heap overflow could
lead to different damages. For example, a crafted TIFF document can lead
to an out-of-bounds read in TIFFCleanup, an invalid free in TIFFClose or
t2p_free, memory corruption in t2p_readwrite_pdf_image, or a double free
in t2p_free. Given these possibilities, it probably could cause
arbitrary code execution.

CVE-2018-5360 	8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 	
LibTIFF before 4.0.6 mishandles the reading of TIFF files, as
demonstrated by a heap-based buffer over-read in the ReadTIFFImage
function in coders/tiff.c in GraphicsMagick 1.3.27.

CVE-2019-3855 	8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 	
An integer overflow flaw which could lead to an out of bounds write was
discovered in libssh2 before 1.8.1 in the way packets are read from the
server. A remote attacker who compromises a SSH server may be able to
execute code on the client system when a user connects to the server.

CVE-2015-1782 	6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 	The
kex_agree_methods function in libssh2 before 1.5.0 allows remote servers
to cause a denial of service (crash) or have other unspecified impact
via crafted length values in an SSH_MSG_KEXINIT packet.

CVE-2019-3856 	8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 	
An integer overflow flaw, which could lead to an out of bounds write,
was discovered in libssh2 before 1.8.1 in the way keyboard prompt
requests are parsed. A remote attacker who compromises a SSH server may
be able to execute code on the client system when a user connects to the
server.

CVE-2019-3857 	8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 	
An integer overflow flaw which could lead to an out of bounds write was
discovered in libssh2 before 1.8.1 in the way SSH_MSG_CHANNEL_REQUEST
packets with an exit signal are parsed. A remote attacker who
compromises a SSH server may be able to execute code on the client
system when a user connects to the server.

CVE-2019-3863 	8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 	
A flaw was found in libssh2 before 1.8.1. A server could send a multiple
keyboard interactive response messages whose total length are greater
than unsigned char max characters. This value is used as an index to
copy memory causing in an out of bounds memory write error.

CVE-2019-3862 	9.1 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H) 	
An out of bounds read flaw was discovered in libssh2 before 1.8.1 in the
way SSH_MSG_CHANNEL_REQUEST packets with an exit status message and no
payload are parsed. A remote attacker who compromises a SSH server may
be able to cause a Denial of Service or read data in the client memory.

CVE-2016-0787 	5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) 	
The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0
improperly truncates secrets to 128 or 256 bits, which makes it easier
for man-in-the-middle attackers to decrypt or intercept SSH sessions via
unspecified vectors, aka a "bits/bytes confusion bug."

CVE-2015-7082 	10.0 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 	Multiple
unspecified vulnerabilities in Git before 2.5.4, as used in Apple Xcode
before 7.2, have unknown impact and attack vectors. NOTE: this CVE is
associated only with Xcode use cases.

CVE-2016-2324 	9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 	
Integer overflow in Git before 2.7.4 allows remote attackers to execute
arbitrary code via a (1) long filename or (2) many nested trees, which
triggers a heap-based buffer overflow.

CVE-2017-14867 	8.8 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 	
Git before 2.10.5, 2.11.x before 2.11.4, 2.12.x before 2.12.5, 2.13.x
before 2.13.6, and 2.14.x before 2.14.2 uses unsafe Perl scripts to
support subcommands such as cvsserver, which allows attackers to execute
arbitrary OS commands via shell metacharacters in a module name. The
vulnerable code is reachable via git-shell even without CVS support.

CVE-2015-7545 	9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 	
The (1) git-remote-ext and (2) unspecified other remote helper programs
in Git before 2.3.10, 2.4.x before 2.4.10, 2.5.x before 2.5.4, and 2.6.x
before 2.6.1 do not properly restrict the allowed protocols, which might
allow remote attackers to execute arbitrary code via a URL in a (a)
.gitmodules file or (b) unknown other sources in a submodule.

CVE-2018-19486 	9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 	
Git before 2.19.2 on Linux and UNIX executes commands from the current
working directory (as if '.' were at the end of $PATH) in certain cases
involving the run_command() API and run-command.c, because there was a
dangerous change from execvp to execv during 2017.

CVE-2018-1000021 	8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
GIT version 2.15.1 and earlier contains a Input
Validation Error vulnerability in Client that can result in problems
including messing up terminal configuration to RCE. This attack appear
to be exploitable via The user must interact with a malicious git
server, (or have their traffic modified in a MITM attack).

CVE-2017-1000117 	8.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 	A
malicious third-party can give a crafted "ssh://..."
URL to an unsuspecting victim, and an attempt to visit the URL can
result in any program that exists on the victim's machine being
executed. Such a URL could be placed in the .gitmodules file of a
malicious project, and an unsuspecting victim could be tricked into
running "git clone --recurse-submodules" to trigger the vulnerability.

CVE-2014-9938 	6.8 AV:N/AC:M/Au:N/C:P/I:P/A:P 	
contrib/completion/git-prompt.sh in Git before 1.9.3 does not sanitize
branch names in the PS1 variable, allowing a malicious repository to
cause code execution.

CVE-2018-11235 	7.8 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 	
In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x
before 2.16.4, and 2.17.x before 2.17.1, remote code execution can
occur. With a crafted .gitmodules file, a malicious project can execute
an arbitrary script on a machine that runs "git clone --recurse-
submodules" because submodule "names" are obtained from this file, and
then appended to $GIT_DIR/modules, leading to directory traversal with
"../" in a name. Finally, post-checkout hooks from a submodule are
executed, bypassing the intended design in which hooks are not obtained
from a remote server.

CVE-2018-11233 	7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) 	
In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x
before 2.16.4, and 2.17.x before 2.17.1, code to sanity-check pathnames
on NTFS can result in reading out-of-bounds memory.

CVE-2017-15298 	5.5 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) 	
Git through 2.14.2 mishandles layers of tree objects, which allows
remote attackers to cause a denial of service (memory consumption) via a
crafted repository, aka a Git bomb. This can also have an impact of disk
consumption; however, an affected process typically would not survive
its attempt to build the data structure in memory before writing to
disk.

CVE-2018-5382 	9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 	
Bouncy Castle BKS version 1 keystore (BKS-V1) files use an HMAC that is
only 16 bits long, which can allow an attacker to compromise the
integrity of a BKS-V1 keystore. All BKS-V1 keystores are vulnerable.
Bouncy Castle release 1.47 introduces BKS version 2, which uses a 160-
bit MAC.

CVE-2018-1000613 	9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
Legion of the Bouncy Castle Legion of the Bouncy Castle
Java Cryptography APIs 1.58 up to but not including 1.60 contains a
CWE-470: Use of Externally-Controlled Input to Select Classes or Code
('Unsafe Reflection') vulnerability in XMSS/XMSS^MT private key
deserialization that can result in Deserializing an XMSS/XMSS^MT private
key can result in the execution of unexpected code. This attack appear
to be exploitable via A handcrafted private key can include references
to unexpected classes which will be picked up from the class path for
the executing application. This vulnerability appears to have been fixed
in 1.60 and later.

CVE-2016-1000344 	7.4 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N) 	In
the Bouncy Castle JCE Provider version 1.55 and
earlier the DHIES implementation allowed the use of ECB mode. This mode
is regarded as unsafe and support for it has been removed from the
provider.

CVE-2016-1000352 	7.4 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N) 	In
the Bouncy Castle JCE Provider version 1.55 and
earlier the ECIES implementation allowed the use of ECB mode. This mode
is regarded as unsafe and support for it has been removed from the
provider.

CVE-2015-7940 	5.0 AV:N/AC:L/Au:N/C:P/I:N/A:N 	The Bouncy Castle Java
library before 1.51 does not validate a point is withing the elliptic
curve, which makes it easier for remote attackers to obtain private keys
via a series of crafted elliptic curve Diffie Hellman (ECDH) key
exchanges, aka an "invalid curve attack."

CVE-2016-1000342 	7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) 	In
the Bouncy Castle JCE Provider version 1.55 and
earlier ECDSA does not fully validate ASN.1 encoding of signature on
verification. It is possible to inject extra elements in the sequence
making up the signature and still have it validate, which in some cases
may allow the introduction of 'invisible' data into a signed structure.

CVE-2016-1000343 	7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) 	In
the Bouncy Castle JCE Provider version 1.55 and
earlier the DSA key pair generator generates a weak private key if used
with default values. If the JCA key pair generator is not explicitly
initialised with DSA parameters, 1.55 and earlier generates a private
value assuming a 1024 bit key size. In earlier releases this can be
dealt with by explicitly passing parameters to the key pair generator.

CVE-2016-1000339 	5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) 	In
the Bouncy Castle JCE Provider version 1.55 and
earlier the primary engine class used for AES was AESFastEngine. Due to
the highly table driven approach used in the algorithm it turns out that
if the data channel on the CPU can be monitored the lookup table
accesses are sufficient to leak information on the AES key being used.
There was also a leak in AESEngine although it was substantially less.
AESEngine has been modified to remove any signs of leakage (testing
carried out on Intel X86-64) and is now the primary AES class for the BC
JCE provider from 1.56. Use of AESFastEngine is now only recommended
where otherwise deemed appropriate.

CVE-2016-1000338 	7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) 	In
Bouncy Castle JCE Provider version 1.55 and earlier
the DSA does not fully validate ASN.1 encoding of signature on
verification. It is possible to inject extra elements in the sequence
making up the signature and still have it validate, which in some cases
may allow the introduction of 'invisible' data into a signed structure.

CVE-2016-1000341 	5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) 	In
the Bouncy Castle JCE Provider version 1.55 and
earlier DSA signature generation is vulnerable to timing attack. Where
timings can be closely observed for the generation of signatures, the
lack of blinding in 1.55, or earlier, may allow an attacker to gain
information about the signature's k value and ultimately the private
value as well.

CVE-2016-1000346 	3.7 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N) 	In
the Bouncy Castle JCE Provider version 1.55 and
earlier the other party DH public key is not fully validated. This can
cause issues as invalid keys can be used to reveal details about the
other party's private key where static Diffie-Hellman is in use. As of
release 1.56 the key parameters are checked on agreement calculation.

CVE-2016-1000345 	5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) 	In
the Bouncy Castle JCE Provider version 1.55 and
earlier the DHIES/ECIES CBC mode vulnerable to padding oracle attack.
For BC 1.55 and older, in an environment where timings can be easily
observed, it is possible with enough observations to identify when the
decryption is failing due to padding.

CVE-2017-13098 	5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) 	
BouncyCastle TLS prior to version 1.0.3, when configured to use the JCE
(Java Cryptography Extension) for cryptographic functions, provides a
weak Bleichenbacher oracle when any TLS cipher suite using RSA key
exchange is negotiated. An attacker can recover the private key from a
vulnerable application. This vulnerability is referred to as "ROBOT."

CVE-2013-1624 	4.0 AV:N/AC:H/Au:N/C:P/I:P/A:N 	The TLS implementation
in the Bouncy Castle Java library before 1.48 and C# library before 1.8
does not properly consider timing side-channel attacks on a noncompliant
MAC check operation during the processing of malformed CBC padding,
which allows remote attackers to conduct distinguishing attacks and
plaintext-recovery attacks via statistical analysis of timing data for
crafted packets, a related issue to CVE-2013-0169.

CVE-2014-3634 	7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 	rsyslog before
7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote
attackers to cause a denial of service (crash), possibly execute
arbitrary code, or have other unspecified impact via a crafted priority
(PRI) value that triggers an out-of-bounds array access.

CVE-2017-12588 	9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 	
The zmq3 input and output modules in rsyslog before 8.28.0 interpreted
description fields as format strings, possibly allowing a format string
attack with unspecified impact.

CVE-2013-4758 	6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 	Double free
vulnerability in the writeDataError function in the ElasticSearch plugin
(omelasticsearch) in rsyslog before 7.4.2 and before 7.5.2 devel, when
errorfile is set to local logging, allows remote attackers to cause a
denial of service (crash) and possibly execute arbitrary code via a
crafted JSON response.

CVE-2011-3200 	5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 	Stack-based
buffer overflow in the parseLegacySyslogMsg function in tools/syslogd.c
in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0 through 5.8.4 might
allow remote attackers to cause a denial of service (application exit)
via a long TAG in a legacy syslog message.

CVE-2014-3683 	5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P) 	Integer overflow
in rsyslog before 7.6.7 and 8.x before 8.4.2 and sysklogd 1.5 and
earlier allows remote attackers to cause a denial of service (crash) via
a large priority (PRI) value. NOTE: this vulnerability exists because of
an incomplete fix for CVE-2014-3634.

CVE-2018-16881 	7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 	
A denial of service vulnerability was found in rsyslog in the imptcp
module. An attacker could send a specially crafted message to the imptcp
socket, which would cause rsyslog to crash. Versions before 8.27.0 are
vulnerable.

CVE-2018-1000180 	7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
Bouncy Castle BC 1.54 - 1.59, BC-FJA 1.0.0, BC-FJA 1.0.1
and earlier have a flaw in the Low-level interface to RSA key pair
generator, specifically RSA Key Pairs generated in low-level API with
added certainty may have less M-R tests than expected. This appears to
be fixed in versions BC 1.60 beta 4 and later, BC-FJA 1.0.2 and later.

CVE-2020-1652 	5.6 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
OpenNMS is exposed via port 9443


Solution:
The following software releases have been updated to resolve this
specific issue: Junos Space and Junos Space Security Director 20.1R1,
and all subsequent releases.

These issues are being tracked as 1482263, 1482261, 1482255, 1482253,
1482133, 1482130 and 1233680.


Workaround:

There are no workarounds for these issues.

To reduce the risk of exploitation of these issues, use access lists or
firewall filters to limit access to Junos Space to only trusted
administrative networks, hosts and users.


Implementation:

Software Releases, patches and updates are available at
https://www.juniper.net/support/downloads/.


Modification History:

2020-07-08: Initial Publication.


CVSS Score:
9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)


Severity Level:
Critical


Severity Assessment:
Information for how Juniper Networks uses CVSS can be found at KB 16446
"Common Vulnerability Scoring System (CVSS) and Juniper's Security
Advisories."

=========================================================
+ CERT-RENATER        | tel : 01-53-94-20-44            +
+ 23/25 Rue Daviel    | fax : 01-53-94-20-41            +
+ 75013 Paris         | email:cert@support.renater.fr   +
=========================================================


