ID

VAR-200712-0088


CVE

CVE-2007-6372


TITLE

BGP implementations do not properly handle UPDATE messages

Trust: 1.6

sources: CERT/CC: VU#929656 // CERT/CC: VU#929656

DESCRIPTION

Unspecified vulnerability in Juniper JUNOS 7.3 through 8.4 allows remote attackers to cause a denial of service (crash) via malformed BGP packets, possibly BGP UPDATE packets that trigger session flapping. BGP implementations from multiple vendors including Juniper may not properly handle specially crafted BGP UPDATE messages. These vulnerabilities could allow an unauthenticated, remote attacker to cause a denial of service. Disrupting BGP communication could lead to routing instability. BGP implementations from multiple vendors including Juniper may not properly handle specially crafted BGP UPDATE messages. These vulnerabilities could allow an unauthenticated, remote attacker to cause a denial of service. Disrupting BGP communication could lead to routing instability. Border Gateway Protocol (BGP) Is AS (Autonomous System) A widely used routing protocol. Between peer routers BGP The exchange of route information by means of is important in the stable operation of the Internet. Versions of JUNOS from 7.3 to 8.4 are reported vulnerable. NOTE: Multiple sources report that upgrading to JUNOS 8.5R1 or above will solve this issue, but this could not be confirmed at the time of writing. It has been assigned its own record because details regarding what technologies are vulnerable and how the various vendors have implemented BGP are not currently available. As more information emerges, we will create individual records to further document the vulnerability for the various vulnerable technologies. AlaxalA Networks AX series and Hitachi GR series are reported vulnerable to this issue. Unspecified technologies from Avici Systems, Inc., Century Systems Inc., and Yamaha Corporation are also reported vulnerable. Juniper Networks Juniper Junos is a set of network operating system of Juniper Networks (Juniper Networks) dedicated to the company's hardware system. The operating system provides a secure programming interface and Junos SDK. There is a loophole in the implementation of the BGP protocol in JUNOS, and a remote attacker may take advantage of this loophole. ---------------------------------------------------------------------- Secunia Network Software Inspector 2.0 (NSI) - Public Beta The Public Beta has ended. Thanks to all that participated. Learn more: http://secunia.com/network_software_inspector_2/ ---------------------------------------------------------------------- TITLE: ALAXALA Networks AX Series BGP UPDATE Message Processing Denial of Service SECUNIA ADVISORY ID: SA30054 VERIFY ADVISORY: http://secunia.com/advisories/30054/ CRITICAL: Moderately critical IMPACT: DoS WHERE: >From remote OPERATING SYSTEM: ALAXALA Networks AX7800S Series http://secunia.com/product/5125/ ALAXALA Networks AX7800R Series http://secunia.com/product/5124/ ALAXALA Networks AX7700R http://secunia.com/product/11176/ ALAXALA Networks AX5400S Series http://secunia.com/product/5126/ ALAXALA Networks AX3600S Series http://secunia.com/product/11174/ ALAXALA Networks AX2400S Series http://secunia.com/product/11175/ ALAXALA Networks AX2000R Series http://secunia.com/product/11177/ DESCRIPTION: A vulnerability has been reported in ALAXALA Networks AX series, which can be exploited by malicious people to cause a DoS (Denial of Service). SOLUTION: Restrict network access on affected systems. PROVIDED AND/OR DISCOVERED BY: Reported via US-CERT. ORIGINAL ADVISORY: US-CERT VU#929656: http://www.kb.cert.org/vuls/id/929656 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . ---------------------------------------------------------------------- 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. SOLUTION: Apply updates (contact the vendor for more information)

Trust: 3.96

sources: NVD: CVE-2007-6372 // CERT/CC: VU#929656 // CERT/CC: VU#929656 // JVNDB: JVNDB-2008-001337 // BID: 26869 // BID: 28999 // VULHUB: VHN-29734 // PACKETSTORM: 66123 // PACKETSTORM: 66130 // PACKETSTORM: 61855

AFFECTED PRODUCTS

vendor:junipermodel:junosscope:eqversion:8.4

Trust: 1.9

vendor:junipermodel:junosscope:eqversion:7.3

Trust: 1.9

vendor:avicimodel: - scope: - version: -

Trust: 1.6

vendor:centurymodel: - scope: - version: -

Trust: 1.6

vendor:extrememodel: - scope: - version: -

Trust: 1.6

vendor:hitachimodel: - scope: - version: -

Trust: 1.6

vendor:junipermodel: - scope: - version: -

Trust: 1.6

vendor:necmodel: - scope: - version: -

Trust: 1.6

vendor:yamahamodel: - scope: - version: -

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:7.6

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:8.2

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:8.3

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:7.5

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:8.1

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:7.4

Trust: 1.6

vendor:junipermodel:junosscope:eqversion:8.0

Trust: 1.6

vendor:hitachimodel:gr4000scope: - version: -

Trust: 1.1

vendor:allied telesismodel:centrecomscope:eqversion:8724sl v2

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:8724sl

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:8748sl

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:8724xl

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:8748xl

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:8948xl

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:9606sx/sc

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:9606t

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:9816gb

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:9812t

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:9924t/4sp

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:9924sp

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:9924ts

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:ar410 v2/ar410s v2

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:ar415s

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:ar450s

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:ar550s

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:ar570s

Trust: 0.8

vendor:allied telesismodel:centrecomscope:eqversion:ar740/ar740s

Trust: 0.8

vendor:allied telesismodel:switchblade 5400s seriesscope: - version: -

Trust: 0.8

vendor:allied telesismodel:switchblade 7800r seriesscope: - version: -

Trust: 0.8

vendor:allied telesismodel:switchblade 7800s seriesscope: - version: -

Trust: 0.8

vendor:allied telesismodel:switchblade4000scope: - version: -

Trust: 0.8

vendor:alaxalamodel:ax2000r seriesscope: - version: -

Trust: 0.8

vendor:alaxalamodel:ax3600s seriesscope: - version: -

Trust: 0.8

vendor:alaxalamodel:ax5400s seriesscope: - version: -

Trust: 0.8

vendor:alaxalamodel:ax6300s seriesscope: - version: -

Trust: 0.8

vendor:alaxalamodel:ax6700s seriesscope: - version: -

Trust: 0.8

vendor:alaxalamodel:ax7700r seriesscope: - version: -

Trust: 0.8

vendor:alaxalamodel:ax7800r seriesscope: - version: -

Trust: 0.8

vendor:alaxalamodel:ax7800s seriesscope: - version: -

Trust: 0.8

vendor:centurymodel:xr-440scope:eqversion:1.7.7 before

Trust: 0.8

vendor:centurymodel:xr-540scope:eqversion:3.5.0 before

Trust: 0.8

vendor:centurymodel:xr-730scope:eqversion:3.4.0 before

Trust: 0.8

vendor:yamahamodel:rt105 seriesscope: - version: -

Trust: 0.8

vendor:yamahamodel:rt107escope: - version: -

Trust: 0.8

vendor:yamahamodel:rt140 seriesscope: - version: -

Trust: 0.8

vendor:yamahamodel:rt250iscope: - version: -

Trust: 0.8

vendor:yamahamodel:rt300iscope: - version: -

Trust: 0.8

vendor:yamahamodel:rtx1000scope: - version: -

Trust: 0.8

vendor:yamahamodel:rtx1100scope: - version: -

Trust: 0.8

vendor:yamahamodel:rtx1500scope: - version: -

Trust: 0.8

vendor:yamahamodel:rtx2000scope: - version: -

Trust: 0.8

vendor:yamahamodel:rtx3000scope: - version: -

Trust: 0.8

vendor:yamahamodel:srt100scope: - version: -

Trust: 0.8

vendor:furukawa electricmodel:fitelnet-f seriesscope:eqversion:fitelnet-f40

Trust: 0.8

vendor:necmodel:ip38x seriesscope:eqversion:1000

Trust: 0.8

vendor:necmodel:ip38x seriesscope:eqversion:107e

Trust: 0.8

vendor:necmodel:ip38x seriesscope:eqversion:1100

Trust: 0.8

vendor:necmodel:ip38x seriesscope:eqversion:1500

Trust: 0.8

vendor:necmodel:ip38x seriesscope:eqversion:250i

Trust: 0.8

vendor:necmodel:ip38x seriesscope:eqversion:3000

Trust: 0.8

vendor:necmodel:ip38x seriesscope:eqversion:sr100

Trust: 0.8

vendor:necmodel:ip8800/s,/rscope:eqversion:s300

Trust: 0.8

vendor:necmodel:ip8800/s,/rscope:eqversion:s400

Trust: 0.8

vendor:necmodel:ip8800/s,/rscope:eqversion:r400 (ax7800s

Trust: 0.8

vendor:necmodel:ip8800/s,/rscope:eqversion:5400s

Trust: 0.8

vendor:necmodel:ip8800/s,/rscope:eqversion:7800r)

Trust: 0.8

vendor:necmodel:ip8800/s,/rscope:eqversion:s3600 (ax3600s)

Trust: 0.8

vendor:necmodel:ip8800/s,/rscope:eqversion:s6300

Trust: 0.8

vendor:necmodel:ip8800/s,/rscope:eqversion:s6700 (ax6300s

Trust: 0.8

vendor:necmodel:ip8800/s,/rscope:eqversion:6700s)

Trust: 0.8

vendor:necmodel:juniper t/m/mx-series routerscope: - version: -

Trust: 0.8

vendor:hitachimodel:gr2000scope: - version: -

Trust: 0.8

vendor:hitachimodel:gs3000scope: - version: -

Trust: 0.8

vendor:hitachimodel:gs4000scope: - version: -

Trust: 0.8

vendor:junipermodel:junos 8.5.r1scope:neversion: -

Trust: 0.3

vendor:hitachimodel:gr3000scope: - version: -

Trust: 0.3

vendor:hitachimodel:gr2000-bhscope: - version: -

Trust: 0.3

vendor:hitachimodel:gr2000-2b+scope: - version: -

Trust: 0.3

vendor:hitachimodel:gr2000-2bscope: - version: -

Trust: 0.3

vendor:hitachimodel:gr2000-1bscope: - version: -

Trust: 0.3

vendor:hitachimodel:alaxala axscope: - version: -

Trust: 0.3

vendor:alaxalamodel:networks ax7800sscope: - version: -

Trust: 0.3

vendor:alaxalamodel:networks ax7800rscope: - version: -

Trust: 0.3

vendor:alaxalamodel:networks ax7700rscope:eqversion:0

Trust: 0.3

vendor:alaxalamodel:networks ax5400sscope: - version: -

Trust: 0.3

vendor:alaxalamodel:networks ax3600sscope:eqversion:0

Trust: 0.3

vendor:alaxalamodel:networks ax2400sscope:eqversion:0

Trust: 0.3

vendor:alaxalamodel:networks ax2000rscope:eqversion:0

Trust: 0.3

sources: CERT/CC: VU#929656 // CERT/CC: VU#929656 // BID: 26869 // BID: 28999 // JVNDB: JVNDB-2008-001337 // CNNVD: CNNVD-200712-169 // NVD: CVE-2007-6372

CVSS

SEVERITY

CVSSV2

CVSSV3

CARNEGIE MELLON: VU#929656
value: 24.49

Trust: 1.6

nvd@nist.gov: CVE-2007-6372
value: HIGH

Trust: 1.0

NVD: CVE-2007-6372
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200712-169
value: HIGH

Trust: 0.6

VULHUB: VHN-29734
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2007-6372
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-29734
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#929656 // CERT/CC: VU#929656 // VULHUB: VHN-29734 // JVNDB: JVNDB-2008-001337 // CNNVD: CNNVD-200712-169 // NVD: CVE-2007-6372

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-29734 // JVNDB: JVNDB-2008-001337 // NVD: CVE-2007-6372

THREAT TYPE

network

Trust: 0.6

sources: BID: 26869 // BID: 28999

TYPE

Design Error

Trust: 0.6

sources: BID: 26869 // BID: 28999

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-001337

PATCH

title:20080513url:http://www.furukawa.co.jp/fitelnet/topic/vulnera_20080513.html

Trust: 0.8

title:JPCERT91637337url:http://www.centurysys.co.jp/support/xr_common/JPCERT91637337.html

Trust: 0.8

title:NV08-004url:http://www.nec.co.jp/security-info/secinfo/nv08-004.html

Trust: 0.8

title:VU929656url:http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/VU929656.html

Trust: 0.8

title:20081024url:http://www.allied-telesis.co.jp/support/list/faq/vuls/20081024.html

Trust: 0.8

title:AX-VU2008-01url:http://www.alaxala.com/jp/support/security/20080508.html

Trust: 0.8

title:BGP_UPDATEurl:http://www.hitachi.co.jp/Prod/comp/network/notice/BGP_UPDATE.html

Trust: 0.8

sources: JVNDB: JVNDB-2008-001337

EXTERNAL IDS

db:CERT/CCid:VU#929656

Trust: 4.9

db:NVDid:CVE-2007-6372

Trust: 4.7

db:SECUNIAid:28100

Trust: 4.2

db:SECTRACKid:1019100

Trust: 4.1

db:BIDid:26869

Trust: 3.6

db:OSVDBid:39157

Trust: 3.3

db:BIDid:28999

Trust: 2.8

db:SECUNIAid:30028

Trust: 1.8

db:VUPENid:ADV-2007-4223

Trust: 1.7

db:JVNDBid:JVNDB-2008-001337

Trust: 0.8

db:NSFOCUSid:11289

Trust: 0.6

db:CNNVDid:CNNVD-200712-169

Trust: 0.6

db:SECUNIAid:30054

Trust: 0.2

db:VULHUBid:VHN-29734

Trust: 0.1

db:PACKETSTORMid:66123

Trust: 0.1

db:PACKETSTORMid:66130

Trust: 0.1

db:PACKETSTORMid:61855

Trust: 0.1

sources: CERT/CC: VU#929656 // CERT/CC: VU#929656 // VULHUB: VHN-29734 // BID: 26869 // BID: 28999 // JVNDB: JVNDB-2008-001337 // PACKETSTORM: 66123 // PACKETSTORM: 66130 // PACKETSTORM: 61855 // CNNVD: CNNVD-200712-169 // NVD: CVE-2007-6372

REFERENCES

url:http://www.securityfocus.com/bid/26869

Trust: 3.3

url:http://www.kb.cert.org/vuls/id/929656

Trust: 3.3

url:http://www.frsirt.com/english/advisories/2007/4223

Trust: 3.0

url:http://www.securityfocus.com/bid/28999

Trust: 2.5

url:http://secunia.com/advisories/28100

Trust: 2.5

url:http://jvn.jp/cert/jvnvu929656/index.html

Trust: 2.4

url:http://securitytracker.com/alerts/2007/dec/1019100.html

Trust: 2.4

url:http://secunia.com/advisories/28100/

Trust: 1.7

url:http://secunia.com/advisories/30028/

Trust: 1.7

url:http://www.osvdb.org/39157

Trust: 1.7

url:http://www.securitytracker.com/id?1019100

Trust: 1.7

url:http://tools.ietf.org/html/rfc4271

Trust: 1.6

url:http://www.iana.org/assignments/bgp-parameters

Trust: 1.6

url:http://tools.ietf.org/html/rfc2385

Trust: 1.6

url:http://tools.ietf.org/html/rfc2439

Trust: 1.6

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2007-6372

Trust: 1.6

url:https://www.juniper.net/alerts/viewalert.jsp?actionbtn=search&txtalertnumber=psn-2007-12-008&viewmod%20e=view

Trust: 1.6

url:http://isc.sans.org/diary.php?storyid=3748

Trust: 1.6

url:https://puck.nether.net/pipermail/juniper-nsp/2007-december/009294.html

Trust: 1.6

url:https://puck.nether.net/pipermail/juniper-nsp/2007-december/009299.html

Trust: 1.6

url:http://osvdb.org/show/osvdb/39157

Trust: 1.6

url:http://www.team-cymru.org/?sec=13&opt=28

Trust: 1.6

url:http://www.vupen.com/english/advisories/2007/4223

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-6372

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-6372

Trust: 0.8

url:http://www.nsfocus.net/vulndb/11289

Trust: 0.6

url:http://www.juniper.net/

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.3

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.3

url:http://secunia.com/about_secunia_advisories/

Trust: 0.3

url:http://secunia.com/network_software_inspector_2/

Trust: 0.2

url:http://secunia.com/product/5126/

Trust: 0.1

url:http://secunia.com/product/11176/

Trust: 0.1

url:http://secunia.com/product/11174/

Trust: 0.1

url:http://secunia.com/product/11177/

Trust: 0.1

url:http://secunia.com/advisories/30054/

Trust: 0.1

url:http://secunia.com/product/5125/

Trust: 0.1

url:http://secunia.com/product/11175/

Trust: 0.1

url:http://secunia.com/product/5124/

Trust: 0.1

url:http://secunia.com/product/5131/

Trust: 0.1

url:http://secunia.com/product/5129/

Trust: 0.1

url:http://secunia.com/product/10974/

Trust: 0.1

url:http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv

Trust: 0.1

url:https://www.juniper.net/alerts/viewalert.jsp?actionbtn=search&txtalertnumber=psn-2007-12-008&viewmod

Trust: 0.1

sources: CERT/CC: VU#929656 // CERT/CC: VU#929656 // VULHUB: VHN-29734 // BID: 26869 // BID: 28999 // JVNDB: JVNDB-2008-001337 // PACKETSTORM: 66123 // PACKETSTORM: 66130 // PACKETSTORM: 61855 // CNNVD: CNNVD-200712-169 // NVD: CVE-2007-6372

CREDITS

Juniper Networks

Trust: 0.6

sources: CNNVD: CNNVD-200712-169

SOURCES

db:CERT/CCid:VU#929656
db:CERT/CCid:VU#929656
db:VULHUBid:VHN-29734
db:BIDid:26869
db:BIDid:28999
db:JVNDBid:JVNDB-2008-001337
db:PACKETSTORMid:66123
db:PACKETSTORMid:66130
db:PACKETSTORMid:61855
db:CNNVDid:CNNVD-200712-169
db:NVDid:CVE-2007-6372

LAST UPDATE DATE

2024-11-23T21:48:34.117000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#929656date:2009-06-09T00:00:00
db:CERT/CCid:VU#929656date:2009-06-09T00:00:00
db:VULHUBid:VHN-29734date:2011-04-29T00:00:00
db:BIDid:26869date:2008-05-05T13:46:00
db:BIDid:28999date:2016-07-06T14:17:00
db:JVNDBid:JVNDB-2008-001337date:2008-11-20T00:00:00
db:CNNVDid:CNNVD-200712-169date:2007-12-14T00:00:00
db:NVDid:CVE-2007-6372date:2024-11-21T00:39:59.370

SOURCES RELEASE DATE

db:CERT/CCid:VU#929656date:2008-05-01T00:00:00
db:CERT/CCid:VU#929656date:2008-05-01T00:00:00
db:VULHUBid:VHN-29734date:2007-12-15T00:00:00
db:BIDid:26869date:2007-12-14T00:00:00
db:BIDid:28999date:2008-05-01T00:00:00
db:JVNDBid:JVNDB-2008-001337date:2008-05-23T00:00:00
db:PACKETSTORMid:66123date:2008-05-08T17:30:50
db:PACKETSTORMid:66130date:2008-05-08T17:30:50
db:PACKETSTORMid:61855date:2007-12-18T00:56:59
db:CNNVDid:CNNVD-200712-169date:2007-12-14T00:00:00
db:NVDid:CVE-2007-6372date:2007-12-15T01:46:00