Oh no, you're thinking, yet another cookie pop-up. Well, sorry, it's the law. We measure how many people read us, and ensure you see relevant ads, by storing cookies on your device. If you're cool with that, hit “Accept all Cookies”. For more info and to customize your settings, hit “Customize Settings”.

Review and manage your consent

Here's an overview of our use of cookies, similar technologies and how to manage them. You can also change your choices at any time, by hitting the “Your Consent Options” link on the site's footer.

Manage Cookie Preferences
  • These cookies are strictly necessary so that you can navigate the site as normal and use all features. Without these cookies we cannot provide you with the service that you expect.

  • These cookies are used to make advertising messages more relevant to you. They perform functions like preventing the same ad from continuously reappearing, ensuring that ads are properly displayed for advertisers, and in some cases selecting advertisements that are based on your interests.

  • These cookies collect information in aggregate form to help us understand how our websites are being used. They allow us to count visits and traffic sources so that we can measure and improve the performance of our sites. If people say no to these cookies, we do not know how many people have visited and we cannot monitor performance.

See also our Cookie policy and Privacy policy.

This article is more than 1 year old

Juniper admins: Pour that hipster gin and settle in for a session

April patch bunch offers lucky thirteen fixes, mostly for Junos OS

Juniper Networks' bug-hunters have bagged a big haul and shown them off with this month's patch collection.

Top of the Gin Palace's priority list is a fix for the critical-rated CVE-2018-0016.

This bug affects devices running Connectionless Network Protocol (CLNP) routing on Junos OS 15.1: a crafted packet can “result in a kernel crash or lead to remote code execution”. If you can't patch, you can apply firewall rules or access lists so CLNP packets are only accepted from trusted hosts.

The company's SRX firewalls have a Network Address Translation (NAT) bug, CVE-2018-0017; a crafted IPv6 packet can hose the device.

SRX devices are vulnerable if they're running versions in the 12.3x46, 12.3x48 or 15.1x49 series of Junos OS.

CVE-2018-0018 is serious, since it creates a firewall bypass vulnerability, but the attacker would need lottery-like luck to exploit it.

Sharp knife slices at a salami as previously sliced pieces lay on the chopping board. Photo by Shutterstock

Juniper sharpens knife for the carrier network and boxes white boxes

READ MORE

“During compilation of IDP policies, an attacker sending specially crafted packets may be able to bypass firewall rules, leading to information disclosure which an attacker may use to gain control of the target device or other internal devices, systems or services protected by the SRX Series device”, the advisory states.

In CVE-2018-0019, Juniper disclosed a bug in the SNMP MIB-II subagent daemon. An attacker can block device monitoring and management by crashing the daemon, but switching, routing and firewall functions will continue.

Routers running Junos OS 13.2R1 and later need to be patched against CVE-2018-0020, a denial-of-service bug caused by an attacker sending malformed BPG-UPDATE messages.

CVE-2018-0021 ensures Junos OS versions from 14.1 through to 17.1 are patched against the risk that short Media Access Control Security keys could yield up passwords.

There is also an mbuf leak (this is the memory buffer kernel service storing network packets and socket buffers) in various Junos OS versions from 12.1x46 through to 17.2 if the device is running VPLS (Virtual Private LAN Services); and the Python implementation of the company's snapshot administrator, JSNAPy, is patched because its config and sample files were world-writable.

Today's announcements also included patches against various historical vulnerabilities:

  • CVE-2015-2080 – Juniper Steel Belted Radius Carrier devices' Web UI was vulnerable to a now-patched bug in the Eclipse Jetty package;
  • The NorthStar Controller included a version of Erlang that's vulnerable to ROBOT – the Return of Bleichenbacher's Oracle Threat;
  • This advisory implements the OpenSSL fixes disclosed in December 2017;
  • Here, Juniper patches stunnel (TLS/SSL tunnelling) bugs from 2008 and 2014;
  • Various CentOS patches dating back as far as 2010 are here;
  • Come to think of it, make that two gins … ®

 

Similar topics

TIP US OFF

Send us news


Other stories you might like