Juniper ScreenOS 6.3.x < 6.3.0r22 Multiple Vulnerabilities in OpenSSL (JSA10733)

Medium Nessus Plugin ID 93383


The remote host is affected by multiple vulnerabilities.


The version of Juniper ScreenOS running on the remote host is 6.3.x prior to 6.3.0r22. It is, therefore, affected by multiple vulnerabilities in its bundled version of OpenSSL :

- A denial of service vulnerability exists due to improper validation of the content and length of the ASN1_TIME string by the X509_cmp_time() function. A remote attacker can exploit this, via a malformed certificate and CRLs of various sizes, to cause a segmentation fault, resulting in a denial of service condition. TLS clients that verify CRLs are affected. TLS clients and servers with client authentication enabled may be affected if they use custom verification callbacks.

- A NULL pointer dereference flaw exists in the PKCS#7 parsing code due to incorrect handling of missing inner 'EncryptedContent'. This allows a remote attacker, via specially crafted ASN.1-encoded PKCS#7 blobs with missing content, to cause a denial of service condition or other potential unspecified impacts. (CVE-2015-1790)

- A double-free error exists due to a race condition that occurs when a NewSessionTicket is received by a multi-threaded client when attempting to reuse a previous ticket. A remote attacker can exploit this to cause a denial of service condition or other potential unspecified impact. (CVE-2015-1791)

- A flaw exists in the ASN1_TFLG_COMBINE implementation in file tasn_dec.c related to handling malformed X509_ATTRIBUTE structures. A remote attacker can exploit this to cause a memory leak by triggering a decoding failure in a PKCS#7 or CMS application, resulting in a denial of service. (CVE-2015-3195)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.


Upgrade to Juniper ScreenOS version 6.3.0r22 or later. Alternatively, refer to the vendor advisory for additional workarounds.

See Also

Plugin Details

Severity: Medium

ID: 93383

File Name: screenos_JSA10733.nasl

Version: $Revision: 1.8 $

Type: local

Family: Firewalls

Published: 2016/09/08

Modified: 2017/07/20

Dependencies: 74148

Risk Information

Risk Factor: Medium


Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C


Base Score: 5.6

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Vulnerability Information

CPE: cpe:/o:juniper:screenos

Required KB Items: Host/Juniper/ScreenOS/display_version, Host/Juniper/ScreenOS/version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2016/04/13

Vulnerability Publication Date: 2015/06/02

Reference Information

CVE: CVE-2015-1789, CVE-2015-1790, CVE-2015-1791, CVE-2015-3195

BID: 75156, 75157, 75161, 78626

OSVDB: 122875, 123173, 123174, 131039

JSA: JSA10733