본문 바로가기

취약점 정보1

Juniper ScreenOS is vulnerable to a denial of service from malformed SSL packets

728x90

Overview

Juniper ScreenOS 6.3, and possibly earlier versions, is vulnerable to a denial of service from malformed SSL packets.

Description

Juniper ScreenOS 6.3, and possibly earlier versions, is vulnerable to a denial of service from malformed SSL packets. Additional details may be found in Juniper security advisory JSA10624.

Impact

A remote unauthenticated attacker may be able to produce an extended denial of service against a ScreenOS firewall by repeatedly sending malformed SSL/TLS packets to the device.

Solution

Apply an Update

Juniper security advisory JSA10624 recommends the following solution.

If you are unable to patch, please consider the following workaround.

Juniper security advisory JSA10624 recommends the following workaround.

    Due to the likelihood of the specific packet occurring during normal activity, Juniper recommends disabling WebUI (SSL) and WebAuth (SSL) until a software fix is available. This includes disabling WebUI (SSL) and WebAuth (SSL) even on internal and protected networks.

    This issue is completely mitigated when WebUI (SSL) and WebAuth (SSL) is disabled.

    Disabling SSL WebUI (HTTPS) is part of our best practices, as mentioned in KB29016.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Juniper Networks, Inc.Affected-16 May 2014

If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base7.8AV:N/AC:L/Au:N/C:N/I:N/A:C
Temporal6.8E:H/RL:OF/RC:C
Environmental6.8CDP:LM/TD:M/CR:L/IR:L/AR:H

References

Credit

Thanks to David Klein of DHK Enterprises for reporting this vulnerability.

This document was written by Jared Allar.

Other Information

  • CVE IDs: CVE-2014-2842
  • Date Public: 16 4월 2014
  • Date First Published: 16 5월 2014
  • Date Last Updated: 16 5월 2014
  • Document Revision: 11
728x90