var-201507-0041
Vulnerability from variot
Juniper Junos OS 12.1X44 before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R9, 12.3X48 before 12.3X48-D15, 13.2 before 13.2R7, 13.2X51 before 13.2X51-D35, 13.2X52 before 13.2X52-D25, 13.3 before 13.3R6, 14.1R3 before 14.1R3-S2, 14.1 before 14.1R4, 14.1X53 before 14.1X53-D12, 14.1X53 before 14.1X53-D16, 14.1X55 before 14.1X55-D25, 14.2 before 14.2R2, and 15.1 before 15.1R1 allows remote attackers to cause a denial of service (mbuf and connection consumption and restart) via a large number of requests that trigger a TCP connection to move to the LAST_ACK state when there is more data to send. Juniper Junos is prone to a remote denial-of-service vulnerability. A remote attacker may exploit this issue to reboot the device, denying service to legitimate users. Juniper Junos OS is a set of network operating system of Juniper Networks (Juniper Networks) dedicated to the company's hardware systems. The operating system provides a secure programming interface and Junos SDK. A security vulnerability exists in Juniper Networks Junos OS. The following versions are affected; Juniper Networks Junos OS 12.1X44 before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R9, 12.3X48 before 12.3X48-D15 , 13.2 version before 13.2R7, 13.2X51 version before 13.2X51-D35, 13.2X52 version before 13.2X52-D25, 13.3 version before 13.3R6, 14.1R3 version before 14.1R3-S2, 14.1 version before 14.1R4, 14.1X53-D12 Version 14.1X53 before, Version 14.1X53 before 14.1X53-D16, Version 14.1X55 before 14.1X55-D25, Version 14.2 before 14.2R2, Version 15.1 before 15.1R1. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
============================================================================= FreeBSD-SA-15:13.tcp Security Advisory The FreeBSD Project
Topic: Resource exhaustion due to sessions stuck in LAST_ACK state
Category: core Module: inet Announced: 2015-07-21 Credits: Lawrence Stewart (Netflix, Inc.), Jonathan Looney (Juniper SIRT) Affects: All supported versions of FreeBSD. Corrected: 2015-07-21 23:42:17 UTC (stable/10, 10.2-PRERELEASE) 2015-07-21 23:42:17 UTC (stable/10, 10.2-BETA1-p1) 2015-07-21 23:42:17 UTC (stable/10, 10.2-BETA2-p1) 2015-07-21 23:42:56 UTC (releng/10.1, 10.1-RELEASE-p15) 2015-07-21 23:42:20 UTC (stable/9, 9.3-STABLE) 2015-07-21 23:42:56 UTC (releng/9.3, 9.3-RELEASE-p20) 2015-07-21 23:42:20 UTC (stable/8, 8.4-STABLE) 2015-07-21 23:42:56 UTC (releng/8.4, 8.4-RELEASE-p34) CVE Name: CVE-2015-5358
For general information regarding FreeBSD Security Advisories, including descriptions of the fields above, security branches, and the following sections, please visit .
I. Background
The Transmission Control Protocol (TCP) of the TCP/IP protocol suite provides a connection-oriented, reliable, sequence-preserving data stream service.
A socket enters the LAST_ACK state when the local process closes its socket after a FIN has already been received from the remote peer. The socket will remain in the LAST_ACK state until the kernel has transmitted a FIN to the remote peer and the kernel has received an acknowledgement of that FIN from the remote peer, or all retransmits of the FIN have failed and the connection times out.
II.
III. This may also happen in normal operation where no intentional attack is conducted, but an attacker who can send specifically crafted packets can trigger this more reliably.
IV. Workaround
No workaround is available, but systems that do not provide TCP based service to untrusted networks are not vulnerable.
Note that the tcpdrop(8) utility can be used to purge connections which have become wedged. For example, the following command can be used to generate commands that would drop all connections whose last rcvtime is more than 100s:
netstat -nxp tcp | \
awk '{ if (int($NF) > 100) print "tcpdrop " $4 " " $5 }'
The system administrator can then run the generated script as a temporary measure. Please refer to the tcpdump(8) manual page for additional information.
V. Solution
Perform one of the following:
1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date.
2) To update your vulnerable system via a binary patch:
Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility:
freebsd-update fetch
freebsd-update install
3) To update your vulnerable system via a source code patch:
The following patches have been verified to apply to the applicable FreeBSD release branches.
a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility.
[FreeBSD 10.1]
fetch https://security.FreeBSD.org/patches/SA-15:13/tcp.patch
fetch https://security.FreeBSD.org/patches/SA-15:13/tcp.patch.asc
gpg --verify tcp.patch.asc
[FreeBSD 9.x and 8.x]
fetch https://security.FreeBSD.org/patches/SA-15:13/tcp-9.patch
fetch https://security.FreeBSD.org/patches/SA-15:13/tcp-9.patch.asc
gpg --verify tcp-9.patch.asc
b) Apply the patch. Execute the following commands as root:
cd /usr/src
patch < /path/to/patch
c) Recompile your kernel as described in and reboot the system.
VI. Correction details
The following list contains the correction revision numbers for each affected branch.
Branch/path Revision
stable/8/ r285779 releng/8.4/ r285780 stable/9/ r285779 releng/9.3/ r285780 stable/10/ r285778 releng/10.1/ r285780
To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed:
svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
Or visit the following URL, replacing NNNNNN with the revision number:
VII. References
The latest revision of this advisory is available at -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.1.6 (FreeBSD)
iQIcBAEBCgAGBQJVrtnrAAoJEO1n7NZdz2rnchoQAMUV9fuXsBvQgvugFVpoe4HP t7tTIzKKmvC3SVOQfPF6jQllVL9qbRJK9zVdFcGX0Iy07/QPKMIRIFXqiYmRwyXt YEuZtZMHEo6w5YS/gEwSndGRFduFAfhaNZndycjA3O5nxR16cvqScDUAv0nErQGD jJzhjbwdrT4fLg06PgLOdNwQKOPhdM1k4ZOdg7WUYDi2iQUmYpD2SOzRAx/SoDK7 N0qd7Cy7mZBLbmm1zbCGDPhvNVYCKQjPjhiZ1GhfzUQ2n9bBOGLf2K1d/N0cttFH /MfJoi2yRlU3iJE2DOJeD0/m4sJLmTL/7sqYEP9W2939oVH0Bku/KoJG4I4rZLDl 6yoKTxtyJGxbw8N2M/ObFpCQwn56Vjf2oo1LhIdBb+T48OwSwxuwrtw4VnlUnVLo oJ5UA1VnazoyU6AwADpHkGPEPvRF1SUXfOuIOoHiZZ6O3eHdoeD3e2HqLQhoYVCj PMEi/k45jPnWWhwV76I65Ig02YRgzhMTSunjXLQhi44Eeavf1SxHTJpSHuVjg3zu MDDW55yB+wJvoetwCg3IkFPfmFBmto679xywDCKVd9VYeKoFsiVE4F/APqf6hN7o qO8etL5oXnwjNsm9Tf8vImoWrBw2gRYkSieG+Vsx4r2r5JNHKRg1AVmRdihI1ATb canMZYhLMD6A1x5T54Ya =UPeI -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201507-0041", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "junos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "13.2x52" }, { "model": "junos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "13.3" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "13.2" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "12.1x47" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "12.1x44" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "14.1" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "13.2x51" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "14.2" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "12.3x48" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "14.1x53" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "14.1x55" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "12.1x46" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "15.1" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "12.1x47-d25" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "14.1r3" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "13.2x51-d35" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "12.1x44" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "13.2r7" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "12.3x48" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "13.3r6" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "14.1x55" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "14.1x53-d12" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "12.1x44-d50" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "12.3" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "14.2" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "14.1x55-d25" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "13.3" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "14.2r2" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "12.3r9" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "12.3x48-d15" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "13.2" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "14.1x53" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "14.1" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "13.2x52-d25" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "14.1x53-d16" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "14.1r3-s2" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "12.1x46" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "13.2x52" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "12.1x47" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "12.1x46-d35" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "15.1r1" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "13.2x51" }, { "model": "junos os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "15.1" }, { "model": "junos os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "14.1r4" }, { "model": "junos 15.1x49-d10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.2r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1r3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.3r5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.3r4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.3r3-s3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.3r3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.3r2-s3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.3r2-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.3r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.3r1.7", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.3r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.2r6", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.2r5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.2r4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.2r3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.2r2-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.2r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.2r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3x48-d10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3r8.7", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3r8", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3r7-s1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3r7", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3r6.6", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3r6", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3r5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3r4.6", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3r4-s3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3r4-s2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3r4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3r3.4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3r3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3r2-s3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3r2", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x47-d20", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x47-d15", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x47-d11", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x47-d10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x46-d30", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x46-d25", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x46-d20.5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x46-d20", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x46-d15", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x46-d10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d45", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d40", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d35.5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d35", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d34", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d32", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d30.4", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d30", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d26", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d25", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d20.3", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d20", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d15", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 15.1r1", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.2r2", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x55-d25", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d16", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1x53-d12", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1r4", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 14.1r3-s2", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.3r6", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.2x52-d25", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 13.2r7", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3x48-d20", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3x48-d15", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.3r9", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x47-d25", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x46-d35", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos 12.1x44-d50", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null } ], "sources": [ { "db": "BID", "id": "75731" }, { "db": "JVNDB", "id": "JVNDB-2015-003849" }, { "db": "CNNVD", "id": "CNNVD-201507-366" }, { "db": "NVD", "id": "CVE-2015-5358" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:juniper:junos", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-003849" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "75731" } ], "trust": 0.3 }, "cve": "CVE-2015-5358", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2015-5358", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-83319", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2015-5358", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2015-5358", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201507-366", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-83319", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-83319" }, { "db": "JVNDB", "id": "JVNDB-2015-003849" }, { "db": "CNNVD", "id": "CNNVD-201507-366" }, { "db": "NVD", "id": "CVE-2015-5358" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Juniper Junos OS 12.1X44 before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R9, 12.3X48 before 12.3X48-D15, 13.2 before 13.2R7, 13.2X51 before 13.2X51-D35, 13.2X52 before 13.2X52-D25, 13.3 before 13.3R6, 14.1R3 before 14.1R3-S2, 14.1 before 14.1R4, 14.1X53 before 14.1X53-D12, 14.1X53 before 14.1X53-D16, 14.1X55 before 14.1X55-D25, 14.2 before 14.2R2, and 15.1 before 15.1R1 allows remote attackers to cause a denial of service (mbuf and connection consumption and restart) via a large number of requests that trigger a TCP connection to move to the LAST_ACK state when there is more data to send. Juniper Junos is prone to a remote denial-of-service vulnerability. \nA remote attacker may exploit this issue to reboot the device, denying service to legitimate users. Juniper Junos OS is a set of network operating system of Juniper Networks (Juniper Networks) dedicated to the company\u0027s hardware systems. The operating system provides a secure programming interface and Junos SDK. A security vulnerability exists in Juniper Networks Junos OS. The following versions are affected; Juniper Networks Junos OS 12.1X44 before 12.1X44-D50, 12.1X46 before 12.1X46-D35, 12.1X47 before 12.1X47-D25, 12.3 before 12.3R9, 12.3X48 before 12.3X48-D15 , 13.2 version before 13.2R7, 13.2X51 version before 13.2X51-D35, 13.2X52 version before 13.2X52-D25, 13.3 version before 13.3R6, 14.1R3 version before 14.1R3-S2, 14.1 version before 14.1R4, 14.1X53-D12 Version 14.1X53 before, Version 14.1X53 before 14.1X53-D16, Version 14.1X55 before 14.1X55-D25, Version 14.2 before 14.2R2, Version 15.1 before 15.1R1. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n=============================================================================\nFreeBSD-SA-15:13.tcp Security Advisory\n The FreeBSD Project\n\nTopic: Resource exhaustion due to sessions stuck in LAST_ACK state\n\nCategory: core\nModule: inet\nAnnounced: 2015-07-21\nCredits: Lawrence Stewart (Netflix, Inc.),\n Jonathan Looney (Juniper SIRT)\nAffects: All supported versions of FreeBSD. \nCorrected: 2015-07-21 23:42:17 UTC (stable/10, 10.2-PRERELEASE)\n 2015-07-21 23:42:17 UTC (stable/10, 10.2-BETA1-p1)\n 2015-07-21 23:42:17 UTC (stable/10, 10.2-BETA2-p1)\n 2015-07-21 23:42:56 UTC (releng/10.1, 10.1-RELEASE-p15)\n 2015-07-21 23:42:20 UTC (stable/9, 9.3-STABLE)\n 2015-07-21 23:42:56 UTC (releng/9.3, 9.3-RELEASE-p20)\n 2015-07-21 23:42:20 UTC (stable/8, 8.4-STABLE)\n 2015-07-21 23:42:56 UTC (releng/8.4, 8.4-RELEASE-p34)\nCVE Name: CVE-2015-5358\n\nFor general information regarding FreeBSD Security Advisories,\nincluding descriptions of the fields above, security branches, and the\nfollowing sections, please visit \u003cURL:https://security.FreeBSD.org/\u003e. \n\nI. Background\n\nThe Transmission Control Protocol (TCP) of the TCP/IP protocol suite\nprovides a connection-oriented, reliable, sequence-preserving data\nstream service. \n\nA socket enters the LAST_ACK state when the local process closes its socket\nafter a FIN has already been received from the remote peer. The socket\nwill remain in the LAST_ACK state until the kernel has transmitted a FIN to\nthe remote peer and the kernel has received an acknowledgement of that FIN\nfrom the remote peer, or all retransmits of the FIN have failed and the\nconnection times out. \n\nII. \n\nIII. This may also happen in normal operation\nwhere no intentional attack is conducted, but an attacker who can send\nspecifically crafted packets can trigger this more reliably. \n\nIV. Workaround\n\nNo workaround is available, but systems that do not provide TCP based\nservice to untrusted networks are not vulnerable. \n\nNote that the tcpdrop(8) utility can be used to purge connections which\nhave become wedged. For example, the following command can be used to\ngenerate commands that would drop all connections whose last rcvtime is\nmore than 100s:\n\n\tnetstat -nxp tcp | \\\n\tawk \u0027{ if (int($NF) \u003e 100) print \"tcpdrop \" $4 \" \" $5 }\u0027\n\nThe system administrator can then run the generated script as a temporary\nmeasure. Please refer to the tcpdump(8) manual page for additional\ninformation. \n\nV. Solution\n\nPerform one of the following:\n\n1) Upgrade your vulnerable system to a supported FreeBSD stable or\nrelease / security branch (releng) dated after the correction date. \n\n2) To update your vulnerable system via a binary patch:\n\nSystems running a RELEASE version of FreeBSD on the i386 or amd64\nplatforms can be updated via the freebsd-update(8) utility:\n\n# freebsd-update fetch\n# freebsd-update install\n\n3) To update your vulnerable system via a source code patch:\n\nThe following patches have been verified to apply to the applicable\nFreeBSD release branches. \n\na) Download the relevant patch from the location below, and verify the\ndetached PGP signature using your PGP utility. \n\n[FreeBSD 10.1]\n# fetch https://security.FreeBSD.org/patches/SA-15:13/tcp.patch\n# fetch https://security.FreeBSD.org/patches/SA-15:13/tcp.patch.asc\n# gpg --verify tcp.patch.asc\n\n[FreeBSD 9.x and 8.x]\n# fetch https://security.FreeBSD.org/patches/SA-15:13/tcp-9.patch\n# fetch https://security.FreeBSD.org/patches/SA-15:13/tcp-9.patch.asc\n# gpg --verify tcp-9.patch.asc\n\nb) Apply the patch. Execute the following commands as root:\n\n# cd /usr/src\n# patch \u003c /path/to/patch\n\nc) Recompile your kernel as described in\n\u003cURL:https://www.FreeBSD.org/handbook/kernelconfig.html\u003e and reboot the\nsystem. \n\nVI. Correction details\n\nThe following list contains the correction revision numbers for each\naffected branch. \n\nBranch/path Revision\n- -------------------------------------------------------------------------\nstable/8/ r285779\nreleng/8.4/ r285780\nstable/9/ r285779\nreleng/9.3/ r285780\nstable/10/ r285778\nreleng/10.1/ r285780\n- -------------------------------------------------------------------------\n\nTo see which files were modified by a particular revision, run the\nfollowing command, replacing NNNNNN with the revision number, on a\nmachine with Subversion installed:\n\n# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base\n\nOr visit the following URL, replacing NNNNNN with the revision number:\n\n\u003cURL:https://svnweb.freebsd.org/base?view=revision\u0026revision=NNNNNN\u003e\n\nVII. References\n\n\u003cURL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5358\u003e\n\nThe latest revision of this advisory is available at\n\u003cURL:https://security.FreeBSD.org/advisories/FreeBSD-SA-15:13.tcp.asc\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v2.1.6 (FreeBSD)\n\niQIcBAEBCgAGBQJVrtnrAAoJEO1n7NZdz2rnchoQAMUV9fuXsBvQgvugFVpoe4HP\nt7tTIzKKmvC3SVOQfPF6jQllVL9qbRJK9zVdFcGX0Iy07/QPKMIRIFXqiYmRwyXt\nYEuZtZMHEo6w5YS/gEwSndGRFduFAfhaNZndycjA3O5nxR16cvqScDUAv0nErQGD\njJzhjbwdrT4fLg06PgLOdNwQKOPhdM1k4ZOdg7WUYDi2iQUmYpD2SOzRAx/SoDK7\nN0qd7Cy7mZBLbmm1zbCGDPhvNVYCKQjPjhiZ1GhfzUQ2n9bBOGLf2K1d/N0cttFH\n/MfJoi2yRlU3iJE2DOJeD0/m4sJLmTL/7sqYEP9W2939oVH0Bku/KoJG4I4rZLDl\n6yoKTxtyJGxbw8N2M/ObFpCQwn56Vjf2oo1LhIdBb+T48OwSwxuwrtw4VnlUnVLo\noJ5UA1VnazoyU6AwADpHkGPEPvRF1SUXfOuIOoHiZZ6O3eHdoeD3e2HqLQhoYVCj\nPMEi/k45jPnWWhwV76I65Ig02YRgzhMTSunjXLQhi44Eeavf1SxHTJpSHuVjg3zu\nMDDW55yB+wJvoetwCg3IkFPfmFBmto679xywDCKVd9VYeKoFsiVE4F/APqf6hN7o\nqO8etL5oXnwjNsm9Tf8vImoWrBw2gRYkSieG+Vsx4r2r5JNHKRg1AVmRdihI1ATb\ncanMZYhLMD6A1x5T54Ya\n=UPeI\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2015-5358" }, { "db": "JVNDB", "id": "JVNDB-2015-003849" }, { "db": "BID", "id": "75731" }, { "db": "VULHUB", "id": "VHN-83319" }, { "db": "PACKETSTORM", "id": "132801" } ], "trust": 2.07 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-83319", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-83319" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-5358", "trust": 2.9 }, { "db": "JUNIPER", "id": "JSA10686", "trust": 2.0 }, { "db": "SECTRACK", "id": "1032842", "trust": 1.7 }, { "db": "SECTRACK", "id": "1033915", "trust": 1.1 }, { "db": "SECTRACK", "id": "1033007", "trust": 1.1 }, { "db": "MCAFEE", "id": "SB10128", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2015-003849", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201507-366", "trust": 0.7 }, { "db": "BID", "id": "75731", "trust": 0.4 }, { "db": "PACKETSTORM", "id": "132801", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-83319", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-83319" }, { "db": "BID", "id": "75731" }, { "db": "JVNDB", "id": "JVNDB-2015-003849" }, { "db": "PACKETSTORM", "id": "132801" }, { "db": "CNNVD", "id": "CNNVD-201507-366" }, { "db": "NVD", "id": "CVE-2015-5358" } ] }, "id": "VAR-201507-0041", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-83319" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T23:09:15.017000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "JSA10686", "trust": 0.8, "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10686" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-003849" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-83319" }, { "db": "JVNDB", "id": "JVNDB-2015-003849" }, { "db": "NVD", "id": "CVE-2015-5358" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securitytracker.com/id/1032842" }, { "trust": 1.6, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10686" }, { "trust": 1.1, "url": "http://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2015-009.txt.asc" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1033007" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1033915" }, { "trust": 1.0, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10128" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5358" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-5358" }, { "trust": 0.3, "url": "http://www.juniper.net/" }, { "trust": 0.3, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10686\u0026cat=sirt_1\u0026actp=list" }, { "trust": 0.1, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026amp;id=jsa10686" }, { "trust": 0.1, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026amp;id=sb10128" }, { "trust": 0.1, "url": "https://security.freebsd.org/advisories/freebsd-sa-15:13.tcp.asc\u003e" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-5358" }, { "trust": 0.1, "url": "https://security.freebsd.org/\u003e." }, { "trust": 0.1, "url": "https://security.freebsd.org/patches/sa-15:13/tcp.patch.asc" }, { "trust": 0.1, "url": "https://security.freebsd.org/patches/sa-15:13/tcp.patch" }, { "trust": 0.1, "url": "https://www.freebsd.org/handbook/kernelconfig.html\u003e" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-5358\u003e" }, { "trust": 0.1, "url": "https://security.freebsd.org/patches/sa-15:13/tcp-9.patch" }, { "trust": 0.1, "url": "https://svnweb.freebsd.org/base?view=revision\u0026revision=nnnnnn\u003e" }, { "trust": 0.1, "url": "https://security.freebsd.org/patches/sa-15:13/tcp-9.patch.asc" } ], "sources": [ { "db": "VULHUB", "id": "VHN-83319" }, { "db": "BID", "id": "75731" }, { "db": "JVNDB", "id": "JVNDB-2015-003849" }, { "db": "PACKETSTORM", "id": "132801" }, { "db": "CNNVD", "id": "CNNVD-201507-366" }, { "db": "NVD", "id": "CVE-2015-5358" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-83319" }, { "db": "BID", "id": "75731" }, { "db": "JVNDB", "id": "JVNDB-2015-003849" }, { "db": "PACKETSTORM", "id": "132801" }, { "db": "CNNVD", "id": "CNNVD-201507-366" }, { "db": "NVD", "id": "CVE-2015-5358" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-07-14T00:00:00", "db": "VULHUB", "id": "VHN-83319" }, { "date": "2015-07-13T00:00:00", "db": "BID", "id": "75731" }, { "date": "2015-07-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-003849" }, { "date": "2015-07-22T18:04:19", "db": "PACKETSTORM", "id": "132801" }, { "date": "2015-07-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201507-366" }, { "date": "2015-07-14T17:59:09.213000", "db": "NVD", "id": "CVE-2015-5358" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-09-21T00:00:00", "db": "VULHUB", "id": "VHN-83319" }, { "date": "2015-07-13T00:00:00", "db": "BID", "id": "75731" }, { "date": "2015-07-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-003849" }, { "date": "2015-07-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201507-366" }, { "date": "2024-11-21T02:32:52.047000", "db": "NVD", "id": "CVE-2015-5358" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201507-366" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Juniper Junos OS Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-003849" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201507-366" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.