Juniper Junos Multiple OpenSSL Vulnerabilities (JSA10649)

high Nessus Plugin ID 78420

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

According to its self-reported version number, the remote Junos device is affected by multiple vulnerabilities in the implementation of OpenSSL :

- An error exists related to 'ec point format extension' handling and multithreaded clients that allows freed memory to be overwritten during a resumed session.
(CVE-2014-3509)

- An error exists related to handling fragmented 'ClientHello' messages that allows a man-in-the-middle attacker to force usage of TLS 1.0 regardless of higher protocol levels being supported by both the server and the client. (CVE-2014-3511)

- A buffer overflow error exists related to handling Secure Remote Password protocol (SRP) parameters having unspecified impact. (CVE-2014-3512)

- A NULL pointer dereference error exists related to handling Secure Remote Password protocol (SRP) that allows a malicious server to crash a client, resulting in a denial of service. (CVE-2014-5139)

Note that these issues only affects devices with J-Web or the SSL service for JUNOScript enabled.

Solution

Apply the relevant Junos software release or workaround referenced in Juniper advisory JSA10649.

See Also

https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10649

https://www.openssl.org/news/secadv/20140806.txt

Plugin Details

Severity: High

ID: 78420

File Name: juniper_jsa10649.nasl

Version: 1.10

Type: combined

Published: 10/14/2014

Updated: 7/12/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:juniper:junos

Required KB Items: Host/Juniper/JUNOS/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 10/8/2014

Vulnerability Publication Date: 8/6/2014

Reference Information

CVE: CVE-2014-3509, CVE-2014-3511, CVE-2014-3512, CVE-2014-5139

BID: 69077, 69079, 69083, 69084

JSA: JSA10649