设为首页 收藏本站
查看: 1307|回复: 0

[经验分享] JUNOS (Juniper) Flaw Exposes Core Routers to Kernel Crash

[复制链接]
发表于 2015-11-5 14:09:33 | 显示全部楼层 |阅读模式
JUNOS (Juniper) Flaw Exposes Core Routers to Kernel Crash
by Prefecton 6 January 2010
http://praetorianprefect.com/wp-content/uploads/2010/01/juniper_thumb.gif
  A report has been received from Juniper at 4:25pm under bulletin PSN-2010-01-623 that a crafted malformed TCP field option in the TCP header of a packet will cause the JUNOS kernel to core (crash). In otherwords the kernel on the network device (gateway router) will crash and reboot if a packet containing this crafted option is received on a listening TCP port. The JUNOS firewall filter is unable to filter a TCP packet with this issue. Juniper claims this issue as exploit was identified during investigation of a vendor interoperability issue.
  There is talk that backbone Internet providers have been quickly patching this issue since yesterday night.
TCP Header Option Space
  “Options occupy space at the end of the TCP header. All options are included in the checksum. An option may begin on any byte boundary. The TCP header must be padded with zeros to make the header length a multiple of 32 bits.” (Source: http://www.networksorcery.com/enp/protocol/tcp.htm)
http://praetorianprefect.com/wp-content/uploads/2010/01/tcp_header1-300x124.jpgTheTCP Header
  Source: http://www.software-engineer-training.com/wp-content/uploads/2007/12/tcp_header.png
The Kernel
  At a high level, the kernel in an operating system serves as the bridge between applications and the actual data processing of the hardware the OS is running on. The kernel manages system resources and abstracts resources that applications must access.
http://praetorianprefect.com/wp-content/uploads/2010/01/kernel-300x237.pngBasicKernel Representation
Affected Devices
  It is basically all of them save the more recent version. If you’ve installed a device with a JUNOS release version released later then 1/28/09, this issue is already corrected. Apparently the original issue and its correction did not conceive of this problem as a security vulnerability, and thus the criticality of applying the patch was not initially understood until this week.

  • JUNOS 10.x  (Removed from the bulletin today, 01/07/09, so assumed to not be affected)
  • JUNOS 9.x
  • JUNOS 7.x
  • JUNOS 8.x
  Please note the versions below were removed from the bulletin today, 01/07/09. This is likely because, as Matt pointed out below, these are end of life versionsof the OS (meaning likely still vulnerable if you happen tobe running them, but out of scope for Juniper because from their standpoint these should already have been upgraded).

  • JUNOS 6.x
  • JUNOS 5.x
  • JUNOS 3.x
  • JUNOS 4.x
Juniper’s Advice
  Juniper references best common practice (BCP) 38, a methodology for reducing the amount of bad packets being forwarded by network devices (basically prohibiting packets where the originator can’t effectively beidentified), as a possible mitigating control.
  However there is no completely effective workaround available other then upgrading the OS.
Update
  Juniper responded to theRegisteras follows: “that the bulletin was one of seven security advisories the company issued under a policy designed to prevent membersof the public at large from getting details of the vulnerabilities.”
  “Because of Juniper’s ‘Entitled Disclosure Policy,’ only our customers and partners are allowed access to the details of the SecurityAdvisory,”
– Juniper spokeswoman
  Interesting approach, and probably would be better received if vulnerabilities only affected those entitled. Unfortunately the networksthat run high end Juniper equipment serve a great many end users, and thus in this case the general public would probably like some informed background. At the point the media is contacting you, it is safe to say the “cat is out of the bag”. And this is the response from a company that is a strong player in the information security appliance space?
  The flip side is that the Juniper response to this issue from a technical perspective has appeared to be at first glance fairly comprehensive, a PR opportunity if managed correctly.
  And yes, this is the same firm that feels this waywhen it is they who are discussing the vulnerability of someone else’s product: “Juniper believes that Jack’s research (on ATM vulnerabilities) is important to be presented in a public forum in orderto advance the state of security,”.
  We agree with the second Juniper: more education, especially after the problem has been corrected, is better.
Finally
  More information will be posted as it becomes available. This was a serious issue which appears to have been averted through a coordinated response. Essentially, given the core equipment (big Telco routers) running “Big Iron” type Juniper network devices, portions of the Internet could have gone black with a successful implementation of this exploit. Routers at this level are not patched like your local Windows OS, it takes something important to justify an outage. As previously noted, even though the code problem itself was identified last year, it appears that the problem was not identified as a mechanism for creating aremote exploit until now, raising the criticality of patching the issueseverely.
             版权声明:本文为博主原创文章,未经博主允许不得转载。

运维网声明 1、欢迎大家加入本站运维交流群:群②:261659950 群⑤:202807635 群⑦870801961 群⑧679858003
2、本站所有主题由该帖子作者发表,该帖子作者与运维网享有帖子相关版权
3、所有作品的著作权均归原作者享有,请您和我们一样尊重他人的著作权等合法权益。如果您对作品感到满意,请购买正版
4、禁止制作、复制、发布和传播具有反动、淫秽、色情、暴力、凶杀等内容的信息,一经发现立即删除。若您因此触犯法律,一切后果自负,我们对此不承担任何责任
5、所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其内容的准确性、可靠性、正当性、安全性、合法性等负责,亦不承担任何法律责任
6、所有作品仅供您个人学习、研究或欣赏,不得用于商业或者其他用途,否则,一切后果均由您自己承担,我们对此不承担任何法律责任
7、如涉及侵犯版权等问题,请您及时通知我们,我们将立即采取措施予以解决
8、联系人Email:admin@iyunv.com 网址:www.yunweiku.com

所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其承担任何法律责任,如涉及侵犯版权等问题,请您及时通知我们,我们将立即处理,联系人Email:kefu@iyunv.com,QQ:1061981298 本贴地址:https://www.yunweiku.com/thread-135495-1-1.html 上篇帖子: 使用juniper禁止访问部分网站 下篇帖子: Juniper Contrail SDN Joins Mirantis OpenStack Party
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

扫码加入运维网微信交流群X

扫码加入运维网微信交流群

扫描二维码加入运维网微信交流群,最新一手资源尽在官方微信交流群!快快加入我们吧...

扫描微信二维码查看详情

客服E-mail:kefu@iyunv.com 客服QQ:1061981298


QQ群⑦:运维网交流群⑦ QQ群⑧:运维网交流群⑧ k8s群:运维网kubernetes交流群


提醒:禁止发布任何违反国家法律、法规的言论与图片等内容;本站内容均来自个人观点与网络等信息,非本站认同之观点.


本站大部分资源是网友从网上搜集分享而来,其版权均归原作者及其网站所有,我们尊重他人的合法权益,如有内容侵犯您的合法权益,请及时与我们联系进行核实删除!



合作伙伴: 青云cloud

快速回复 返回顶部 返回列表