kb.juniper.net Open in urlscan Pro
44.239.157.150  Public Scan

Submitted URL: http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10774
Effective URL: https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10774
Submission: On November 25 via api from PL — Scanned from DE

Form analysis 1 forms found in the DOM

#

<form action="#" slot="thumbs-icons">
  <span class="thumbs-icons">
    <button onclick="fnAddThumb('up')" disabled="">
      <sw-icon class="swmaterialicon thumbsup">thumbsup</sw-icon>
    </button>
    <p>0</p>
  </span>
  <span class="thumbs-icons">
    <button onclick="fnAddThumb('down')" disabled="">
      <sw-icon class="swmaterialicon thumbsup">thumbsdown</sw-icon>
    </button>
    <p>0</p>
  </span>
</form>

Text Content

 * Login
 * User Registration
 * Login Assistance
 * Edit Account Information
 * Reset Password
 * Change Password
 * Manage Subscriptions

Support Support Downloads Knowledge Base Juniper Support Portal Community


KNOWLEDGE BASE

Search our Knowledge Base sites to find answers to your questions.

Ask All Knowledge Base Sites All Knowledge Base Sites JunosE Defect
(KA)Knowledge BaseSecurity AdvisoriesTechnical BulletinsTechnotes lockSign in to
display secure content and recently viewed articlesnavigate_next
 * printer Print
 * border_color Report a Security Vulnerability

2017-01 Security Bulletin: Network and Security Manager (NSM): Multiple OpenSSH
and other third party software vulnerabilities affect NSM Appliance OS.

thumbsup

0

thumbsdown

0

Article ID: JSA10774 SECURITY_ADVISORIES Last Updated: 17 Jan 2017Version: 2.0
Product Affected:

NSM Appliances (NSM3000, NSM4000 and NSMExpress).
Problem:


Vulnerabilities in OpenSSH, Apache HTTP server, Libxml2, Linux Kernel,
PostgreSQL and other third party software potentially affect NSM Appliance OS.

These software packages are updated in the NSM Appliance OS gzip upgrade package
v3 based on CentOS 6. Important security issues resolved as a result of this
upgrade include,

CVE CVSS base score Summary CVE-2015-5600 6.5
(CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L) The kbdint_next_device function
in auth2-chall.c in sshd in OpenSSH through 6.9 does not properly restrict the
processing of keyboard-interactive devices within a single connection, which
makes it easier for remote attackers to conduct brute-force attacks or cause a
denial of service (CPU consumption) via a long and duplicative list in the ssh
-oKbdInteractiveDevices option, as demonstrated by a modified client that
provides a different password for each pam element on this list. CVE-2015-6564 7
(CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) Use-after-free vulnerability in
the mm_answer_pam_free_ctx function in monitor.c in sshd in OpenSSH before 7.0
on non-OpenBSD platforms might allow local users to gain privileges by
leveraging control of the sshd uid to send an unexpectedly early
MONITOR_REQ_PAM_FREE_CTX request. CVE-2016-3115 6.4
(CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N) Multiple CRLF injection
vulnerabilities in session.c in sshd in OpenSSH before 7.2p2 allow remote
authenticated users to bypass intended shell-command restrictions via crafted
X11 forwarding data, related to the (1) do_authenticated1 and (2)
session_x11_req functions. CVE-2015-5352 3.7
(CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N) The x11_open_helper function in
channels.c in ssh in OpenSSH before 6.9, when ForwardX11Trusted mode is not
used, lacks a check of the refusal deadline for X connections, which makes it
easier for remote attackers to bypass intended access restrictions via a
connection outside of the permitted time window. CVE-2015-6563 2.5
(CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N) The monitor component in sshd in
OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in
MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct
impersonation attacks by leveraging any SSH login access in conjunction with
control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to
monitor.c and monitor_wrap.c. CVE-2016-5195 7.8
(CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) Race condition in mm/gup.c in the
Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges
by leveraging incorrect handling of a copy-on-write (COW) feature to write to a
read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty
COW." CVE-2015-5157 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C) arch/x86/entry/entry_64.S
in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults
in processing NMIs that occurred during userspace execution, which might allow
local users to gain privileges by triggering an NMI. CVE-2016-1583 7.2
(AV:L/AC:L/Au:N/C:C/I:C/A:C) The ecryptfs_privileged_open function in
fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to
gain privileges or cause a denial of service (stack memory consumption) via
vectors involving crafted mmap calls for /proc pathnames, leading to recursive
pagefault handling. CVE-2016-4565 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C) The
InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on
the write system call, which allows local users to cause a denial of service
(kernel memory write operation) or possibly have unspecified other impact via a
uAPI interface. CVE-2016-5829 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C) Multiple
heap-based buffer overflows in the hiddev_ioctl_usage function in
drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users
to cause a denial of service or possibly have unspecified other impact via a
crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call. CVE-2015-2925 6.9
(AV:L/AC:M/Au:N/C:C/I:C/A:C) The prepend_path function in fs/dcache.c in the
Linux kernel before 4.2.4 does not properly handle rename actions inside a bind
mount, which allows local users to bypass an intended container protection
mechanism by renaming a directory, related to a "double-chroot attack."
CVE-2015-7547 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) Multiple stack-based buffer
overflows in the (1) send_dg and (2) send_vc functions in the libresolv library
in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to
cause a denial of service (crash) or possibly execute arbitrary code via a
crafted DNS response that triggers a call to the getaddrinfo function with the
AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS
queries" and the libnss_dns.so.2 NSS module. CVE-2016-1833 6.8
(AV:N/AC:M/Au:N/C:P/I:P/A:P) The htmlCurrentChar function in libxml2 before
2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before
9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of
service (heap-based buffer over-read) via a crafted XML document. CVE-2016-1834
6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P) Heap-based buffer overflow in the xmlStrncat
function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before
10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to
execute arbitrary code or cause a denial of service (memory corruption) via a
crafted XML document. CVE-2015-5288 6.4 (AV:N/AC:L/Au:N/C:P/I:N/A:P) The crypt
function in contrib/pgcrypto in PostgreSQL before 9.0.23, 9.1.x before 9.1.19,
9.2.x before 9.2.14, 9.3.x before 9.3.10, and 9.4.x before 9.4.5 allows
attackers to cause a denial of service (server crash) or read arbitrary server
memory via a "too-short" salt. CVE-2016-5387 5.1 (AV:N/AC:H/Au:N/C:P/I:P/A:P)
The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and
therefore does not protect applications from the presence of untrusted client
data in the HTTP_PROXY environment variable, which might allow remote attackers
to redirect an application's outbound HTTP traffic to an arbitrary proxy server
via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the
vendor states "This mitigation has been assigned the identifier CVE-2016-5387";
in other words, this is not a CVE ID for a vulnerability. CVE-2016-0773 5.0
(AV:N/AC:L/Au:N/C:N/I:N/A:P) PostgreSQL before 9.1.20, 9.2.x before 9.2.15,
9.3.x before 9.3.11, 9.4.x before 9.4.6, and 9.5.x before 9.5.1 allows remote
attackers to cause a denial of service (infinite loop or buffer overflow and
crash) via a large Unicode character range in a regular expression.


Please refer to JSA10759 for a list of OpenSSL vulnerabilities resolved.

Juniper SIRT is not aware of any malicious exploitation of these vulnerabilities
on NSM Appliances.

Solution:


All these issues are resolved in NSM Appliance Upgrade Package v3 based on
CentOS 6 (released January 11, 2017).

OpenSSH upgrade issue is being tracked as PR 1181267 and is visible on the
Customer Support website.

Workaround:

Use access lists or firewall filters to limit access to the NSM Appliance only
from trusted hosts.
Implementation:


NSM Maintenance Releases are available at
http://www.juniper.net/support/downloads/?p=nsm#sw.

Modification History:

2017-01-11: Initial release.
2017-01-17: Solution is now available for download; Updated the list of
important third party software upgraded, and related CVEs.

CVSS Score:

7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
Severity Level:

High

Severity Assessment:

Considering the highest score of 7.8 from CVE-2016-5195.
Acknowledgements:

 

Related Links

 * KB16613: Overview of the Juniper Networks SIRT Quarterly Security Bulletin
   Publication Process
 * KB16765: In which releases are vulnerabilities fixed?
 * KB16446: Common Vulnerability Scoring System (CVSS) and Juniper's Security
   Advisories
 * Report a Security Vulnerability - How to Contact the Juniper Networks
   Security Incident Response Team

Comment on this article > Affected Products Browse the Knowledge Base for more
articles related to these product categories. Select a category to begin.
 * NSMXpress
 * NSM
 * NSM3000
 * SIRT Advisory

Getting Up and Running with Junos

Getting Up and Running with Junos Security Alerts and Vulnerabilities Product
Alerts and Software Release Notices Problem Report (PR) Search Tool EOL Notices
and Bulletins JTAC User Guide Customer Care User Guide Pathfinder SRX High
Availability Configurator SRX VPN Configurator Training Courses and Videos End
User Licence Agreement Global Search