Vulnerabilities > CVE-2016-1275 - Resource Management Errors vulnerability in Juniper Junos

047910
CVSS 6.1 - MEDIUM
Attack vector
ADJACENT_NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
COMPLETE
low complexity
juniper
CWE-399
nessus

Summary

Juniper Junos OS before 13.3R9, 14.1R6 before 14.1R6-S1, and 14.1 before 14.1R7, when configured with VPLS routing-instances, allows remote attackers to obtain sensitive mbuf information by injecting a flood of Ethernet frames with IPv6 MAC addresses directly into a connected interface.

Common Weakness Enumeration (CWE)

Nessus

NASL familyJunos Local Security Checks
NASL idJUNIPER_JSA10750.NASL
descriptionAccording to its self-reported version number and configuration, the remote Juniper Junos device is affected by a denial of service vulnerability when VPLS routing-instances are configured. An unauthenticated, adjacent attacker can exploit this, via Ethernet frames with the EtherType field of IPv6 (0x86DD), to cause a denial of service condition.
last seen2019-12-13
modified2016-07-22
plugin id92518
published2016-07-22
reporterThis script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/92518
titleJuniper Junos VPLS Ethernet Frame MAC Address Remote DoS (JSA10750)
code
#TRUSTED 7cadf10b0f43f936773b27461cec0cdf2930f08530976139fc87101635abaf75c367ad9469c280054b4c5bda57da04ec21d45aa19b279929e39e951171ac61c0df00dc4ed82d357a53502ed70e2d419ae5cfefa55144437d1834af08707b34984a620adba61adf3b565909e6ba129a93afd94c652ca6a6892ba02439b0e5c048f879acbf62075b38bcc287619614c317b2de655b724eaffa26f3096cab2e998a01398173ec2c1b23dd9d4ed0c6c87482c445bf97c35e3bedf27cade5feaacaa58483fd7ccd4d984cdebbcf45b48a59bfb631368d6d86a137f3bb0b6806540e6e721c02e5bfce2cf7a80c50457db1410012994ee9a9533147ea03de51de61b66b262a093313bc60db6779b6ac2fd11e33e5d7532af129b4d3f7c26e4b5149150f9c5511a8297ac0ea4658b39018f7119dffd821c09add8322ca7462bc7336d802f653b89d31a3b911fa4756d16a56d412a0634b72474762ab91d655a927e11842d0b23609ad1d536cbedc857940a348b7f94d1b98083b7f0968f265199fb0a8aa7ac93cf08a3f4caef8663763f035aa66e05d4ad3d3b8e3664c35b09fe3e99ffd61e45c7c7150e215dcd680a20f2df2da8125c611e35c93eea52d28e90529e0d63d97af656ce0130f4aa49cb179240153a4240d8b013f1fee9739a87afdba9e725f29a94a6d399ef4d9727d8fedb23f63f170a95a1e5e78a191e4380e939448ff
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(92518);
  script_version("1.9");
  script_set_attribute(attribute:"plugin_modification_date", value:"2019/12/09");

  script_cve_id("CVE-2016-1275");
  script_bugtraq_id(91758);
  script_xref(name:"JSA", value:"JSA10750");

  script_name(english:"Juniper Junos VPLS Ethernet Frame MAC Address Remote DoS (JSA10750)");
  script_summary(english:"Checks the Junos version.");

  script_set_attribute(attribute:"synopsis", value:
"The remote device is missing a vendor-supplied security patch.");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version number and configuration, the
remote Juniper Junos device is affected by a denial of service
vulnerability when VPLS routing-instances are configured. An
unauthenticated, adjacent attacker can exploit this, via Ethernet
frames with the EtherType field of IPv6 (0x86DD), to cause a denial of
service condition.");
  script_set_attribute(attribute:"see_also", value:"https://kb.juniper.net/JSA10750");
  script_set_attribute(attribute:"solution", value:
"Upgrade to the relevant Junos software release referenced in Juniper
advisory JSA10750. Alternatively, if EtherType IPv6 MAC addresses are
not required, configure a VPLS flood filter.");
  script_set_cvss_base_vector("CVSS2#AV:A/AC:L/Au:N/C:N/I:N/A:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2016-1275");

  script_set_attribute(attribute:"vuln_publication_date", value:"2016/07/13");
  script_set_attribute(attribute:"patch_publication_date", value:"2016/07/13");
  script_set_attribute(attribute:"plugin_publication_date", value:"2016/07/22");

  script_set_attribute(attribute:"plugin_type", value:"combined");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:juniper:junos");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Junos Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("junos_version.nasl");
  script_require_keys("Host/Juniper/JUNOS/Version", "Host/Juniper/model");

  exit(0);
}

include("audit.inc");
include("junos_kb_cmd_func.inc");
include("misc_func.inc");

ver   = get_kb_item_or_exit('Host/Juniper/JUNOS/Version');
model = get_kb_item_or_exit('Host/Juniper/model');
fixes = make_array();

fixes['13.3'] = '13.3R9';
fixes['14.1'] = '14.1R6-S1'; # or 14.1R7
fixes['14.2'] = '14.2R1';
fixes['15.1R'] = '15.1R1';
fixes['15.1F'] = '15.1F2';
fixes['16.1R'] = '16.1R1';

fix = check_junos(ver:ver, fixes:fixes, exit_on_fail:TRUE);

if (fix == "14.1R6-S1")
  fix += " or 14.1R7";

override = TRUE;
buf = junos_command_kb_item(cmd:"show route instance detail");
if (buf)
{
  pattern = "Type:\s+vpls\s+State:\s+Active";
  if (!pgrep(string:buf, pattern:pattern))
    audit(AUDIT_HOST_NOT, 'affected because no VPLS routing-instances are configured');
  override = FALSE;
}

junos_report(ver:ver, fix:fix, model:model, override:override, severity:SECURITY_WARNING);