This issue may affect any product or platform running Junos OS 8.5 or later.On April 22nd, 2009 FreeBSD announced that the db interface in libc in FreeBSD 6.3, 6.4, 7.0, 7.1, and 7.2-PRERELEASE does not properly initialize memory for Berkeley DB 1.85 database structures, which allows local users to obtain sensitive information by reading a database file.This announcement leaves a gap in the affected version detail of the advisory, as it states “All supported versions of FreeBSD.” which were 6.3 to 7.2-PRERELEASE at that time.  It does not indicate if the issue affects earlier versions or not.Junos OS operates on either FreeBSD 6.1 and earlier, or FreeBSD 10.1 and later depending on the version of Junos OS.More than one version of the underlying FreeBSD system is supported on some versions of Junos OS. e.g. Junos OS 15.1R1 and later introduces the option for upgrading the underlying FreeBSD 6.1 system to FreeBSD 10.1.  Additionally, some customers may operate on Junos OS 15.1R1, while retaining the underlying FreeBSD 6.1 system; some customers in certain countries may only operate Junos OS 15.1R1 and later using FreeBSD 6.1.Juniper SIRT is not aware of any malicious exploitation of this vulnerability.No other Juniper Networks products or platforms are affected by this issue.To proactively mitigate against the risk indicated in the FreeBSD advisory, Juniper resolved the underlying problem in Junos OS based on FreeBSD 6.1 as well as FreeBSD 10.1.The following software releases have been updated to resolve this specific issue: 12.1X44-D55 12.1X46-D40 12.1X47-D25 12.3X48-D20 12.3X50-D50 12.3R11 13.2X51-D40 13.2X52-D30 13.2R8 13.3R7 14.1X53-D30 14.1R6 14.2R4 15.1X49-D10 15.1X49-D20 15.1R2 15.1F3 and subsequent releases.This issue is being tracked as PR 442580 and is visible on the Customer Support website.KB16765 – “In which releases are vulnerabilities fixed?” describes which release vulnerabilities are fixed as per our End of Engineering and End of Life support policies.Limit access to the device to only trusted hosts and administrators.How to obtain fixed software: Security vulnerabilities in Junos are fixed in the next available Maintenance Release of each supported Junos version. In some cases, a Maintenance Release is not planned to be available in an appropriate time-frame. For these cases, Service Releases are made available in order to be more timely. Security Advisory and Security Notices will indicate which Maintenance and Service Releases contain fixes for the issues described. Upon request to JTAC, customers will be provided download instructions for a Service Release. Although Juniper does not provide formal Release Note documentation for a Service Release, a list of “PRs fixed” can be provided on request.Modification History:
2016-07-13: Initial publication
Information for how Juniper Networks uses CVSS can be found at KB 16446 “Common Vulnerability Scoring System (CVSS) and Juniper’s Security Advisories.”

Leave a Reply