Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CERTFR-2019-AVI-500
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer aux bulletins de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- Produits NFX, Junos OS versions antérieures à 18.2R1, 18.2X75-D5
- Produits CTP, CTPView versions antérieures à 7.3R6
- Produits EX, Junos OS versions antérieures à 12.3R12-S15
- Produits SRX
- Junos OS versions antérieures à 12.3X48-D80, 15.1X49-D120, 15.1X49-D150, 15.1X49-D171, 15.1X49-D180, à partir de la version 18.2R2-S1 et antérieures à 18.2R3, 18.4R2, ainsi que les versions antérieures à 18.2R3, 19.2R1 pour la série SRX 5000
- Junos OS avec J-Web activé versions antérieures à 12.3X48-D85, 15.1X49-D180
- Junos OS avec SIP ALG activé versions antérieures à 12.3X48-D61, 12.3X48-D65, 15.1X49-D130, 17.3R3, 17.4R2
- Produits MX
- Junos OS gamme MX480, MX960, MX2008, MX2010, MX2020 versions antérieures à 18.1R2-S4, 18.1R3-S5, 18.1X75-D10 et ultérieures, versions antérieures à 18.2R1-S5, 18.2R2-S3, 18.2R3, 18.2X75-D50, 18.3R1-S4, 18.3R2, 18.3R3, 18.4R1-S2, 18.4R2
- Junos OS avec DHCPv6 activé versions antérieures à 15.1R7-S5, 16.1R7-S5, 16.2R2-S10, 17.1R3-S1, 17.2R3-S2, 17.3R3-S6, 17.4R2-S5, 17.4R3, 18.1R3-S6, 18.2R2-S4, 18.2R3, 18.2X75-D50, 18.3R1-S5, 18.3R3, 18.4R2, 19.1R1-S2, 19.1R2
- Junos OS avec cartes MS-PIC, MS-MIC ou MS-MPC et activation de NAT et SIP ALG, versions antérieures 16.1R7-S5, 16.2R2-S11, 17.1R3, 17.2R3-S3, 17.3R3-S6, 17.4R2-S8, 17.4R3, 18.1R3-S3, 18.2R3, 18.3R2, 18.4R
- Toutes séries
- Junos OS versions antérieures à 15.1F6-S12, 15.1R7-S2, 15.1X49-D171, 15.1X49-D180, 15.1X53-D235, 15.1X53-D495, 15.1X53-D590, 15.1X53-D496, 15.1X53-D68, 15.1X53-D69, 16.1R3-S10, 16.1R4-S12, 16.1R6-S6, 16.1R7-S2, 16.2R2-S7, 17.1R3, 17.2R1-S7, 17.2R2-S6, 17.2R3, 17.2R3-S1, 17.3R2-S4, 17.3R3, 17.3R3-S4, 17.4R1-S6, 17.4R1-S7, 17.4R2-S3, 17.4R3, 18.1R2-S4, 18.1R3-S1, 18.1X75, 18.2R1-S5, 18.2R2-S2, 18.2R3, 18.3R1-S3, 18.3R2, 18.4R1-S2, 18.4R2
- Junos OS avec J-Web activé versions antérieures à 14.1X53-D51, 15.1F6-S13, 15.1R7-S5, 15.1X53-D238, 16.1R4-S13, 16.1R7-S5, 16.2R2-S10, 17.1R3-S1, 17.2R2-S8, 17.2R3-S3, 17.3R3-S5, 17.4R2-S8, 17.4R3, 18.1R3-S8, 18.2R3, 18.3R3, 18.4R2, 19.1R1-S2, 19.1R2
- Junos OS sur des équipements avec l'option Multi-Chassis Link Aggregation Group (MC-LAG) activée, versions ultérieures à 15.1 et antérieures à 16.1R6-S2, 16.1R7, 16.2R2-S10, 17.1R3
Impacted products
Vendor | Product | Description |
---|
References
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [], "affected_systems_content": "\u003cul\u003e \u003cli\u003eProduits NFX, Junos OS versions ant\u00e9rieures \u00e0 18.2R1, 18.2X75-D5\u003c/li\u003e \u003cli\u003eProduits CTP, CTPView versions ant\u00e9rieures \u00e0 7.3R6\u003c/li\u003e \u003cli\u003eProduits EX, Junos OS versions ant\u00e9rieures \u00e0 12.3R12-S15\u003c/li\u003e \u003cli\u003eProduits SRX \u003cul\u003e \u003cli\u003eJunos OS versions ant\u00e9rieures \u00e0 12.3X48-D80, 15.1X49-D120, 15.1X49-D150, 15.1X49-D171, 15.1X49-D180, \u00e0 partir de la version 18.2R2-S1 et ant\u00e9rieures \u00e0 18.2R3, 18.4R2, ainsi que les versions ant\u00e9rieures \u00e0 18.2R3, 19.2R1 pour la s\u00e9rie SRX 5000\u003c/li\u003e \u003cli\u003eJunos OS avec J-Web activ\u00e9 versions ant\u00e9rieures \u00e0 12.3X48-D85, 15.1X49-D180\u003c/li\u003e \u003cli\u003eJunos OS avec SIP ALG activ\u00e9 versions ant\u00e9rieures \u00e0 12.3X48-D61, 12.3X48-D65, 15.1X49-D130, 17.3R3, 17.4R2\u003c/li\u003e \u003c/ul\u003e \u003c/li\u003e \u003cli\u003eProduits MX \u003cul\u003e \u003cli\u003eJunos OS gamme\u00a0MX480, MX960, MX2008, MX2010, MX2020 versions ant\u00e9rieures \u00e0 18.1R2-S4, 18.1R3-S5, 18.1X75-D10 et ult\u00e9rieures, versions ant\u00e9rieures \u00e0 18.2R1-S5, 18.2R2-S3, 18.2R3, 18.2X75-D50, 18.3R1-S4, 18.3R2, 18.3R3, 18.4R1-S2, 18.4R2\u003c/li\u003e \u003cli\u003eJunos OS avec DHCPv6 activ\u00e9 versions ant\u00e9rieures \u00e0 15.1R7-S5, 16.1R7-S5, 16.2R2-S10, 17.1R3-S1, 17.2R3-S2, 17.3R3-S6, 17.4R2-S5, 17.4R3, 18.1R3-S6, 18.2R2-S4, 18.2R3, 18.2X75-D50, 18.3R1-S5, 18.3R3, 18.4R2, 19.1R1-S2, 19.1R2\u003c/li\u003e \u003cli\u003eJunos OS avec cartes MS-PIC, MS-MIC ou MS-MPC et activation de NAT et SIP ALG, versions ant\u00e9rieures 16.1R7-S5, 16.2R2-S11, 17.1R3, 17.2R3-S3, 17.3R3-S6, 17.4R2-S8, 17.4R3, 18.1R3-S3, 18.2R3, 18.3R2, 18.4R\u003c/li\u003e \u003c/ul\u003e \u003c/li\u003e \u003cli\u003eToutes s\u00e9ries \u003cul\u003e \u003cli\u003eJunos OS versions ant\u00e9rieures \u00e0 15.1F6-S12, 15.1R7-S2,\u00a0 15.1X49-D171, 15.1X49-D180, 15.1X53-D235, 15.1X53-D495, 15.1X53-D590,\u00a0 15.1X53-D496, 15.1X53-D68, 15.1X53-D69, 16.1R3-S10, 16.1R4-S12, 16.1R6-S6, 16.1R7-S2, 16.2R2-S7, 17.1R3, 17.2R1-S7, 17.2R2-S6, 17.2R3, 17.2R3-S1, 17.3R2-S4, 17.3R3, 17.3R3-S4, 17.4R1-S6, 17.4R1-S7, 17.4R2-S3, 17.4R3, 18.1R2-S4, 18.1R3-S1, 18.1X75, 18.2R1-S5, 18.2R2-S2, 18.2R3, 18.3R1-S3, 18.3R2, 18.4R1-S2, 18.4R2\u003c/li\u003e \u003cli\u003eJunos OS avec J-Web activ\u00e9 versions ant\u00e9rieures \u00e0 14.1X53-D51, 15.1F6-S13, 15.1R7-S5, 15.1X53-D238, 16.1R4-S13, 16.1R7-S5, 16.2R2-S10, 17.1R3-S1, 17.2R2-S8, 17.2R3-S3, 17.3R3-S5, 17.4R2-S8, 17.4R3, 18.1R3-S8, 18.2R3, 18.3R3, 18.4R2, 19.1R1-S2, 19.1R2\u003c/li\u003e \u003cli\u003eJunos OS sur des \u00e9quipements avec l\u0027option Multi-Chassis Link Aggregation Group (MC-LAG) activ\u00e9e, versions ult\u00e9rieures \u00e0 15.1 et ant\u00e9rieures \u00e0 16.1R6-S2, 16.1R7, 16.2R2-S10, 17.1R3\u003c/li\u003e \u003c/ul\u003e \u003c/li\u003e \u003c/ul\u003e ", "content": "## Solution\n\nSe r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2019-0061", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0061" }, { "name": "CVE-2019-0054", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0054" }, { "name": "CVE-2019-0058", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0058" }, { "name": "CVE-2019-0056", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0056" }, { "name": "CVE-2019-0062", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0062" }, { "name": "CVE-2016-10011", "url": "https://www.cve.org/CVERecord?id=CVE-2016-10011" }, { "name": "CVE-2016-10009", "url": "https://www.cve.org/CVERecord?id=CVE-2016-10009" }, { "name": "CVE-2019-0057", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0057" }, { "name": "CVE-2019-0067", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0067" }, { "name": "CVE-2019-0063", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0063" }, { "name": "CVE-2019-0064", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0064" }, { "name": "CVE-2016-10010", "url": "https://www.cve.org/CVERecord?id=CVE-2016-10010" }, { "name": "CVE-2018-20685", "url": "https://www.cve.org/CVERecord?id=CVE-2018-20685" }, { "name": "CVE-2016-10012", "url": "https://www.cve.org/CVERecord?id=CVE-2016-10012" }, { "name": "CVE-2015-8325", "url": "https://www.cve.org/CVERecord?id=CVE-2015-8325" }, { "name": "CVE-2019-0065", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0065" }, { "name": "CVE-2019-0059", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0059" }, { "name": "CVE-2019-0055", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0055" }, { "name": "CVE-2019-0060", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0060" }, { "name": "CVE-2019-0066", "url": "https://www.cve.org/CVERecord?id=CVE-2019-0066" } ], "initial_release_date": "2019-10-10T00:00:00", "last_revision_date": "2019-10-10T00:00:00", "links": [], "reference": "CERTFR-2019-AVI-500", "revisions": [ { "description": "Version initiale", "revision_date": "2019-10-10T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nJuniper. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service \u00e0 distance, un contournement de la politique de\ns\u00e9curit\u00e9 et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10962 du 10 octobre 2019", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10962\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10954 du 10 octobre 2019", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10954\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10953 du 10 octobre 2019", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10953\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10957 du 10 octobre 2019", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10957\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10952 du 10 octobre 2019", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10952\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10965 du 10 octobre 2019", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10965\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10964 du 10 octobre 2019", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10964\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10960 du 10 octobre 2019", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10960\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10963 du 10 octobre 2019", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10963\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10958 du 10 octobre 2019", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10958\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10959 du 10 octobre 2019", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10959\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10966 du 10 octobre 2019", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10966\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10956 du 10 octobre 2019", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10956\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10955 du 10 octobre 2019", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10955\u0026cat=SIRT_1\u0026actp=LIST" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10961 du 10 octobre 2019", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10961\u0026cat=SIRT_1\u0026actp=LIST" } ] }
CVE-2019-0067 (GCVE-0-2019-0067)
Vulnerability from cvelistv5
Published
2019-10-09 19:26
Modified
2024-09-16 20:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial of Service (DoS)
Summary
Receipt of a specific link-local IPv6 packet destined to the RE may cause the system to crash and restart (vmcore). By continuously sending a specially crafted IPv6 packet, an attacker can repeatedly crash the system causing a prolonged Denial of Service (DoS). This issue affects Juniper Networks Junos OS: 16.1 versions prior to 16.1R6-S2, 16.1R7; 16.2 versions prior to 16.2R2-S10; 17.1 versions prior to 17.1R3. This issue does not affect Juniper Networks Junos OS version 15.1 and prior versions.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Juniper Networks | Junos OS |
Patch: unspecified Version: 16.1 < 16.1R6-S2, 16.1R7 Version: 16.2 < 16.2R2-S10 Version: 17.1 < 17.1R3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:37:07.182Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.juniper.net/JSA10966" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Junos OS", "vendor": "Juniper Networks", "versions": [ { "lessThanOrEqual": "15.1", "status": "unaffected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "16.1R6-S2, 16.1R7", "status": "affected", "version": "16.1", "versionType": "custom" }, { "lessThan": "16.2R2-S10", "status": "affected", "version": "16.2", "versionType": "custom" }, { "lessThan": "17.1R3", "status": "affected", "version": "17.1", "versionType": "custom" } ] } ], "configurations": [ { "lang": "en", "value": "This issue affects Junos OS devices with Multi-Chassis Link Aggregation Group (MC-LAG) enabled." } ], "datePublic": "2019-10-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Receipt of a specific link-local IPv6 packet destined to the RE may cause the system to crash and restart (vmcore). By continuously sending a specially crafted IPv6 packet, an attacker can repeatedly crash the system causing a prolonged Denial of Service (DoS). This issue affects Juniper Networks Junos OS: 16.1 versions prior to 16.1R6-S2, 16.1R7; 16.2 versions prior to 16.2R2-S10; 17.1 versions prior to 17.1R3. This issue does not affect Juniper Networks Junos OS version 15.1 and prior versions." } ], "exploits": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service (DoS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-09T19:26:17", "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "shortName": "juniper" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.juniper.net/JSA10966" } ], "solutions": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: 16.1R6-S2, 16.1R7, 16.2R2-S10, 17.1R3, 17.2R1, and all subsequent releases." } ], "source": { "advisory": "JSA10966", "defect": [ "1261996" ], "discovery": "USER" }, "title": "Junos OS: Kernel crash (vmcore) upon receipt of a specific link-local IPv6 packet on devices configured with Multi-Chassis Link Aggregation Group (MC-LAG)", "workarounds": [ { "lang": "en", "value": "There are no available workarounds for this issue." } ], "x_generator": { "engine": "Vulnogram 0.0.6" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "sirt@juniper.net", "DATE_PUBLIC": "2019-10-09T16:00:00.000Z", "ID": "CVE-2019-0067", "STATE": "PUBLIC", "TITLE": "Junos OS: Kernel crash (vmcore) upon receipt of a specific link-local IPv6 packet on devices configured with Multi-Chassis Link Aggregation Group (MC-LAG)" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Junos OS", "version": { "version_data": [ { "version_affected": "!\u003c=", "version_value": "15.1" }, { "version_affected": "\u003c", "version_name": "16.1", "version_value": "16.1R6-S2, 16.1R7" }, { "version_affected": "\u003c", "version_name": "16.2", "version_value": "16.2R2-S10" }, { "version_affected": "\u003c", "version_name": "17.1", "version_value": "17.1R3" } ] } } ] }, "vendor_name": "Juniper Networks" } ] } }, "configuration": [ { "lang": "en", "value": "This issue affects Junos OS devices with Multi-Chassis Link Aggregation Group (MC-LAG) enabled." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Receipt of a specific link-local IPv6 packet destined to the RE may cause the system to crash and restart (vmcore). By continuously sending a specially crafted IPv6 packet, an attacker can repeatedly crash the system causing a prolonged Denial of Service (DoS). This issue affects Juniper Networks Junos OS: 16.1 versions prior to 16.1R6-S2, 16.1R7; 16.2 versions prior to 16.2R2-S10; 17.1 versions prior to 17.1R3. This issue does not affect Juniper Networks Junos OS version 15.1 and prior versions." } ] }, "exploit": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "generator": { "engine": "Vulnogram 0.0.6" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service (DoS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.juniper.net/JSA10966", "refsource": "CONFIRM", "url": "https://kb.juniper.net/JSA10966" } ] }, "solution": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: 16.1R6-S2, 16.1R7, 16.2R2-S10, 17.1R3, 17.2R1, and all subsequent releases." } ], "source": { "advisory": "JSA10966", "defect": [ "1261996" ], "discovery": "USER" }, "work_around": [ { "lang": "en", "value": "There are no available workarounds for this issue." } ] } } }, "cveMetadata": { "assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "assignerShortName": "juniper", "cveId": "CVE-2019-0067", "datePublished": "2019-10-09T19:26:17.865599Z", "dateReserved": "2018-10-11T00:00:00", "dateUpdated": "2024-09-16T20:12:09.888Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-10011 (GCVE-0-2016-10011)
Vulnerability from cvelistv5
Published
2017-01-05 00:00
Modified
2024-08-06 03:07
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process.
References
URL | Tags | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T03:07:32.056Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20171130-0002/" }, { "name": "[oss-security] 20161219 Announce: OpenSSH 7.4 released", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/12/19/2" }, { "name": "1037490", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037490" }, { "tags": [ "x_transferred" ], "url": "https://github.com/openbsd/src/commit/ac8147a06ed2e2403fb6b9a0c03e618a9333c0e9" }, { "tags": [ "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03818en_us" }, { "tags": [ "x_transferred" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.647637" }, { "name": "RHSA-2017:2029", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2029" }, { "name": "[debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html" }, { "name": "94977", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securityfocus.com/bid/94977" }, { "tags": [ "x_transferred" ], "url": "https://www.openssh.com/txt/release-7.4" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-676336.pdf" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-12-19T00:00:00", "descriptions": [ { "lang": "en", "value": "authfile.c in sshd in OpenSSH before 7.4 does not properly consider the effects of realloc on buffer contents, which might allow local users to obtain sensitive private-key information by leveraging access to a privilege-separated child process." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-13T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://security.netapp.com/advisory/ntap-20171130-0002/" }, { "name": "[oss-security] 20161219 Announce: OpenSSH 7.4 released", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2016/12/19/2" }, { "name": "1037490", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1037490" }, { "url": "https://github.com/openbsd/src/commit/ac8147a06ed2e2403fb6b9a0c03e618a9333c0e9" }, { "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03818en_us" }, { "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.647637" }, { "name": "RHSA-2017:2029", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2029" }, { "name": "[debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html" }, { "name": "94977", "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/94977" }, { "url": "https://www.openssh.com/txt/release-7.4" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-676336.pdf" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-10011", "datePublished": "2017-01-05T00:00:00", "dateReserved": "2016-12-19T00:00:00", "dateUpdated": "2024-08-06T03:07:32.056Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-0066 (GCVE-0-2019-0066)
Vulnerability from cvelistv5
Published
2019-10-09 19:26
Modified
2024-09-16 22:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-394 - Unexpected Status Code or Return Value
Summary
An unexpected status return value weakness in the Next-Generation Multicast VPN (NG-mVPN) service of Juniper Networks Junos OS allows attacker to cause a Denial of Service (DoS) condition and core the routing protocol daemon (rpd) process when a specific malformed IPv4 packet is received by the device running BGP. This malformed packet can be crafted and sent to a victim device including when forwarded directly through a device receiving such a malformed packet, but not if the malformed packet is first de-encapsulated from an encapsulated format by a receiving device. Continued receipt of the malformed packet will result in a sustained Denial of Service condition. This issue affects: Juniper Networks Junos OS 15.1 versions prior to 15.1F6-S12, 15.1R7-S2; 15.1X49 versions prior to 15.1X49-D150 on SRX Series; 15.1X53 versions prior to 15.1X53-D68, 15.1X53-D235, 15.1X53-D495, 15.1X53-D590; 16.1 versions prior to 16.1R3-S10, 16.1R4-S12, 16.1R6-S6, 16.1R7-S2; 16.2 versions prior to 16.2R2-S7; 17.1 versions prior to 17.1R2-S9, 17.1R3; 17.2 versions prior to 17.2R1-S7, 17.2R2-S6, 17.2R3; 17.3 versions prior to 17.3R2-S4, 17.3R3.
References
URL | Tags | |||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
Juniper Networks | Junos OS |
Version: 15.1 < 15.1F6-S12, 15.1R7-S2 Version: 16.1 < 16.1R3-S10, 16.1R4-S12, 16.1R6-S6, 16.1R7-S2 Version: 16.2 < 16.2R2-S7 Version: 17.1 < 17.1R2-S9, 17.1R3 Version: 17.2 < 17.2R1-S7, 17.2R2-S6, 17.2R3 Version: 17.3 < 17.3R2-S4, 17.3R3 Version: 15.1X53 < 15.1X53-D68, 15.1X53-D235, 15.1X53-D495, 15.1X53-D590 |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:37:07.557Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.juniper.net/JSA10965" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.juniper.net/documentation/en_US/junos/topics/task/configuration/ng-mvpn-services-enabling.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Junos OS", "vendor": "Juniper Networks", "versions": [ { "lessThan": "15.1F6-S12, 15.1R7-S2", "status": "affected", "version": "15.1", "versionType": "custom" }, { "lessThan": "16.1R3-S10, 16.1R4-S12, 16.1R6-S6, 16.1R7-S2", "status": "affected", "version": "16.1", "versionType": "custom" }, { "lessThan": "16.2R2-S7", "status": "affected", "version": "16.2", "versionType": "custom" }, { "lessThan": "17.1R2-S9, 17.1R3", "status": "affected", "version": "17.1", "versionType": "custom" }, { "lessThan": "17.2R1-S7, 17.2R2-S6, 17.2R3", "status": "affected", "version": "17.2", "versionType": "custom" }, { "lessThan": "17.3R2-S4, 17.3R3", "status": "affected", "version": "17.3", "versionType": "custom" }, { "lessThan": "15.1X53-D68, 15.1X53-D235, 15.1X53-D495, 15.1X53-D590", "status": "affected", "version": "15.1X53", "versionType": "custom" } ] }, { "platforms": [ "SRX Series" ], "product": "Junos OS", "vendor": "Juniper Networks", "versions": [ { "lessThan": "15.1X49-D150", "status": "affected", "version": "15.1X49", "versionType": "custom" } ] } ], "datePublic": "2019-10-09T00:00:00", "descriptions": [ { "lang": "en", "value": "An unexpected status return value weakness in the Next-Generation Multicast VPN (NG-mVPN) service of Juniper Networks Junos OS allows attacker to cause a Denial of Service (DoS) condition and core the routing protocol daemon (rpd) process when a specific malformed IPv4 packet is received by the device running BGP. This malformed packet can be crafted and sent to a victim device including when forwarded directly through a device receiving such a malformed packet, but not if the malformed packet is first de-encapsulated from an encapsulated format by a receiving device. Continued receipt of the malformed packet will result in a sustained Denial of Service condition. This issue affects: Juniper Networks Junos OS 15.1 versions prior to 15.1F6-S12, 15.1R7-S2; 15.1X49 versions prior to 15.1X49-D150 on SRX Series; 15.1X53 versions prior to 15.1X53-D68, 15.1X53-D235, 15.1X53-D495, 15.1X53-D590; 16.1 versions prior to 16.1R3-S10, 16.1R4-S12, 16.1R6-S6, 16.1R7-S2; 16.2 versions prior to 16.2R2-S7; 17.1 versions prior to 17.1R2-S9, 17.1R3; 17.2 versions prior to 17.2R1-S7, 17.2R2-S6, 17.2R3; 17.3 versions prior to 17.3R2-S4, 17.3R3." } ], "exploits": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-394", "description": "CWE-394 Unexpected Status Code or Return Value", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-09T19:26:17", "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "shortName": "juniper" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://kb.juniper.net/JSA10965" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.juniper.net/documentation/en_US/junos/topics/task/configuration/ng-mvpn-services-enabling.html" } ], "solutions": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: 15.1F6-S12, 15.1R7-S2, 15.1X49-D150, 15.1X53-D68, 15.1X53-D235, 15.1X53-D495, 15.1X53-D590, 16.1R3-S10, 16.1R4-S12, 16.1R6-S6, 16.1R7-S2, 16.2R2-S7, 17.1R2-S9, 17.1R3, 17.2R1-S7, 17.2R2-S6, 17.2R3, 17.3R2-S4, 17.3R3, 17.4R1, and all subsequent releases." } ], "source": { "advisory": "JSA10965", "defect": [ "1309982" ], "discovery": "INTERNAL" }, "title": "Junos OS: A malformed IPv4 packet received by Junos in an NG-mVPN scenario may cause the routing protocol daemon (rpd) process to core", "workarounds": [ { "lang": "en", "value": "Discontinue use of BGP services if not needed. Otherwise, there are no viable workarounds for this issue." } ], "x_generator": { "engine": "Vulnogram 0.0.6" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "sirt@juniper.net", "DATE_PUBLIC": "2019-10-09T16:00:00.000Z", "ID": "CVE-2019-0066", "STATE": "PUBLIC", "TITLE": "Junos OS: A malformed IPv4 packet received by Junos in an NG-mVPN scenario may cause the routing protocol daemon (rpd) process to core" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Junos OS", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "15.1", "version_value": "15.1F6-S12, 15.1R7-S2" }, { "platform": "SRX Series", "version_affected": "\u003c", "version_name": "15.1X49", "version_value": "15.1X49-D150" }, { "version_affected": "\u003c", "version_name": "16.1", "version_value": "16.1R3-S10, 16.1R4-S12, 16.1R6-S6, 16.1R7-S2" }, { "version_affected": "\u003c", "version_name": "16.2", "version_value": "16.2R2-S7" }, { "version_affected": "\u003c", "version_name": "17.1", "version_value": "17.1R2-S9, 17.1R3" }, { "version_affected": "\u003c", "version_name": "17.2", "version_value": "17.2R1-S7, 17.2R2-S6, 17.2R3" }, { "version_affected": "\u003c", "version_name": "17.3", "version_value": "17.3R2-S4, 17.3R3" }, { "version_affected": "\u003c", "version_name": "15.1X53", "version_value": "15.1X53-D68, 15.1X53-D235, 15.1X53-D495, 15.1X53-D590" } ] } } ] }, "vendor_name": "Juniper Networks" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An unexpected status return value weakness in the Next-Generation Multicast VPN (NG-mVPN) service of Juniper Networks Junos OS allows attacker to cause a Denial of Service (DoS) condition and core the routing protocol daemon (rpd) process when a specific malformed IPv4 packet is received by the device running BGP. This malformed packet can be crafted and sent to a victim device including when forwarded directly through a device receiving such a malformed packet, but not if the malformed packet is first de-encapsulated from an encapsulated format by a receiving device. Continued receipt of the malformed packet will result in a sustained Denial of Service condition. This issue affects: Juniper Networks Junos OS 15.1 versions prior to 15.1F6-S12, 15.1R7-S2; 15.1X49 versions prior to 15.1X49-D150 on SRX Series; 15.1X53 versions prior to 15.1X53-D68, 15.1X53-D235, 15.1X53-D495, 15.1X53-D590; 16.1 versions prior to 16.1R3-S10, 16.1R4-S12, 16.1R6-S6, 16.1R7-S2; 16.2 versions prior to 16.2R2-S7; 17.1 versions prior to 17.1R2-S9, 17.1R3; 17.2 versions prior to 17.2R1-S7, 17.2R2-S6, 17.2R3; 17.3 versions prior to 17.3R2-S4, 17.3R3." } ] }, "exploit": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "generator": { "engine": "Vulnogram 0.0.6" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-394 Unexpected Status Code or Return Value" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.juniper.net/JSA10965", "refsource": "MISC", "url": "https://kb.juniper.net/JSA10965" }, { "name": "https://www.juniper.net/documentation/en_US/junos/topics/task/configuration/ng-mvpn-services-enabling.html", "refsource": "MISC", "url": "https://www.juniper.net/documentation/en_US/junos/topics/task/configuration/ng-mvpn-services-enabling.html" } ] }, "solution": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: 15.1F6-S12, 15.1R7-S2, 15.1X49-D150, 15.1X53-D68, 15.1X53-D235, 15.1X53-D495, 15.1X53-D590, 16.1R3-S10, 16.1R4-S12, 16.1R6-S6, 16.1R7-S2, 16.2R2-S7, 17.1R2-S9, 17.1R3, 17.2R1-S7, 17.2R2-S6, 17.2R3, 17.3R2-S4, 17.3R3, 17.4R1, and all subsequent releases." } ], "source": { "advisory": "JSA10965", "defect": [ "1309982" ], "discovery": "INTERNAL" }, "work_around": [ { "lang": "en", "value": "Discontinue use of BGP services if not needed. Otherwise, there are no viable workarounds for this issue." } ] } } }, "cveMetadata": { "assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "assignerShortName": "juniper", "cveId": "CVE-2019-0066", "datePublished": "2019-10-09T19:26:17.824789Z", "dateReserved": "2018-10-11T00:00:00", "dateUpdated": "2024-09-16T22:15:50.586Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-0064 (GCVE-0-2019-0064)
Vulnerability from cvelistv5
Published
2019-10-09 19:26
Modified
2024-09-17 02:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial of Service
Summary
On SRX5000 Series devices, if 'set security zones security-zone <zone> tcp-rst' is configured, the flowd process may crash when a specific TCP packet is received by the device and triggers a new session. The process restarts automatically. However, receipt of a constant stream of these TCP packets may result in an extended Denial of Service (DoS) condition on the device. This issue affects Juniper Networks Junos OS: 18.2R3 on SRX 5000 Series; 18.4R2 on SRX 5000 Series; 19.2R1 on SRX 5000 Series.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Juniper Networks | Junos OS |
Version: 18.2R3 Version: 18.4R2 Version: 19.2R1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:37:07.646Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.juniper.net/JSA10963" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "SRX 5000 Series" ], "product": "Junos OS", "vendor": "Juniper Networks", "versions": [ { "status": "affected", "version": "18.2R3" }, { "status": "affected", "version": "18.4R2" }, { "status": "affected", "version": "19.2R1" } ] } ], "datePublic": "2019-10-09T00:00:00", "descriptions": [ { "lang": "en", "value": "On SRX5000 Series devices, if \u0027set security zones security-zone \u003czone\u003e tcp-rst\u0027 is configured, the flowd process may crash when a specific TCP packet is received by the device and triggers a new session. The process restarts automatically. However, receipt of a constant stream of these TCP packets may result in an extended Denial of Service (DoS) condition on the device. This issue affects Juniper Networks Junos OS: 18.2R3 on SRX 5000 Series; 18.4R2 on SRX 5000 Series; 19.2R1 on SRX 5000 Series." } ], "exploits": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-09T19:26:17", "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "shortName": "juniper" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://kb.juniper.net/JSA10963" } ], "solutions": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: 18.2R3-S1, 18.4R2-S1, 18.4R3, 19.2R1-S1, 19.2R2, 19.3R1, and all subsequent releases." } ], "source": { "advisory": "JSA10963", "defect": [ "1445480" ], "discovery": "INTERNAL" }, "title": "Junos OS: SRX5000 Series: flowd process crash due to receipt of specific TCP packet", "workarounds": [ { "lang": "en", "value": "There are no viable workarounds for this issue." } ], "x_generator": { "engine": "Vulnogram 0.0.8" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "sirt@juniper.net", "DATE_PUBLIC": "2019-10-09T16:00:00.000Z", "ID": "CVE-2019-0064", "STATE": "PUBLIC", "TITLE": "Junos OS: SRX5000 Series: flowd process crash due to receipt of specific TCP packet" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Junos OS", "version": { "version_data": [ { "platform": "SRX 5000 Series", "version_affected": "=", "version_value": "18.2R3" }, { "platform": "SRX 5000 Series", "version_affected": "=", "version_value": "18.4R2" }, { "platform": "SRX 5000 Series", "version_affected": "=", "version_value": "19.2R1" } ] } } ] }, "vendor_name": "Juniper Networks" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "On SRX5000 Series devices, if \u0027set security zones security-zone \u003czone\u003e tcp-rst\u0027 is configured, the flowd process may crash when a specific TCP packet is received by the device and triggers a new session. The process restarts automatically. However, receipt of a constant stream of these TCP packets may result in an extended Denial of Service (DoS) condition on the device. This issue affects Juniper Networks Junos OS: 18.2R3 on SRX 5000 Series; 18.4R2 on SRX 5000 Series; 19.2R1 on SRX 5000 Series." } ] }, "exploit": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "generator": { "engine": "Vulnogram 0.0.8" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.juniper.net/JSA10963", "refsource": "MISC", "url": "https://kb.juniper.net/JSA10963" } ] }, "solution": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: 18.2R3-S1, 18.4R2-S1, 18.4R3, 19.2R1-S1, 19.2R2, 19.3R1, and all subsequent releases." } ], "source": { "advisory": "JSA10963", "defect": [ "1445480" ], "discovery": "INTERNAL" }, "work_around": [ { "lang": "en", "value": "There are no viable workarounds for this issue." } ] } } }, "cveMetadata": { "assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "assignerShortName": "juniper", "cveId": "CVE-2019-0064", "datePublished": "2019-10-09T19:26:17.743483Z", "dateReserved": "2018-10-11T00:00:00", "dateUpdated": "2024-09-17T02:53:30.644Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-20685 (GCVE-0-2018-20685)
Vulnerability from cvelistv5
Published
2019-01-10 00:00
Modified
2024-08-05 12:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.
References
URL | Tags | |||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T12:05:17.712Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-4387", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4387" }, { "name": "USN-3885-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/3885-1/" }, { "tags": [ "x_transferred" ], "url": "https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2" }, { "tags": [ "x_transferred" ], "url": "https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197\u0026r2=1.198\u0026f=h" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20190215-0001/" }, { "name": "106531", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106531" }, { "tags": [ "x_transferred" ], "url": "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt" }, { "name": "GLSA-201903-16", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201903-16" }, { "name": "[debian-lts-announce] 20190325 [SECURITY] [DLA 1728-1] openssh security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "name": "RHSA-2019:3702", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3702" }, { "name": "GLSA-202007-53", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202007-53" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-01-10T00:00:00", "descriptions": [ { "lang": "en", "value": "In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-13T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "DSA-4387", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2019/dsa-4387" }, { "name": "USN-3885-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/3885-1/" }, { "url": "https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2" }, { "url": "https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197\u0026r2=1.198\u0026f=h" }, { "url": "https://security.netapp.com/advisory/ntap-20190215-0001/" }, { "name": "106531", "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/106531" }, { "url": "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt" }, { "name": "GLSA-201903-16", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/201903-16" }, { "name": "[debian-lts-announce] 20190325 [SECURITY] [DLA 1728-1] openssh security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html" }, { "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "name": "RHSA-2019:3702", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:3702" }, { "name": "GLSA-202007-53", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202007-53" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-20685", "datePublished": "2019-01-10T00:00:00", "dateReserved": "2019-01-10T00:00:00", "dateUpdated": "2024-08-05T12:05:17.712Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-0056 (GCVE-0-2019-0056)
Vulnerability from cvelistv5
Published
2019-10-09 19:26
Modified
2024-09-16 18:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-410 - Insufficient Resource Pool
Summary
This issue only affects devices with three (3) or more MPC10's installed in a single chassis with OSPF enabled and configured on the device. An Insufficient Resource Pool weakness allows an attacker to cause the device's Open Shortest Path First (OSPF) states to transition to Down, resulting in a Denial of Service (DoS) attack. This attack requires a relatively large number of specific Internet Mixed (IMIXed) types of genuine and valid IPv6 packets to be transferred by the attacker in a relatively short period of time, across three or more PFE's on the device at the same time. Continued receipt of the traffic sent by the attacker will continue to cause OSPF to remain in the Down starting state, or flap between other states and then again to Down, causing a persistent Denial of Service. This attack will affect all IPv4, and IPv6 traffic served by the OSPF routes once the OSPF states transition to Down. This issue affects: Juniper Networks Junos OS on MX480, MX960, MX2008, MX2010, MX2020: 18.1 versions prior to 18.1R2-S4, 18.1R3-S5; 18.1X75 version 18.1X75-D10 and later versions; 18.2 versions prior to 18.2R1-S5, 18.2R2-S3, 18.2R3; 18.2X75 versions prior to 18.2X75-D50; 18.3 versions prior to 18.3R1-S4, 18.3R2, 18.3R3; 18.4 versions prior to 18.4R1-S2, 18.4R2.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Juniper Networks | Junos OS |
Version: 18.1 < 18.1R2-S4, 18.1R3-S5 Version: 18.2 < 18.2R1-S5, 18.2R2-S3, 18.2R3 Version: 18.2X75 < 18.2X75-D50 Version: 18.3 < 18.3R1-S4, 18.3R2, 18.3R3 Version: 18.4 < 18.4R1-S2, 18.4R2 Version: 18.1X75-D10 < 18.1X75* |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:37:07.427Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.juniper.net/JSA10954" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "MX480, MX960, MX2008, MX2010, MX2020" ], "product": "Junos OS", "vendor": "Juniper Networks", "versions": [ { "lessThan": "18.1R2-S4, 18.1R3-S5", "status": "affected", "version": "18.1", "versionType": "custom" }, { "lessThan": "18.2R1-S5, 18.2R2-S3, 18.2R3", "status": "affected", "version": "18.2", "versionType": "custom" }, { "lessThan": "18.2X75-D50", "status": "affected", "version": "18.2X75", "versionType": "custom" }, { "lessThan": "18.3R1-S4, 18.3R2, 18.3R3", "status": "affected", "version": "18.3", "versionType": "custom" }, { "lessThan": "18.4R1-S2, 18.4R2", "status": "affected", "version": "18.4", "versionType": "custom" }, { "lessThan": "18.1X75*", "status": "affected", "version": "18.1X75-D10", "versionType": "custom" } ] } ], "configurations": [ { "lang": "en", "value": "OSPF configuration examples can be found at https://www.juniper.net/documentation/en_US/junos/topics/topic-map/ospf-configuring-interfaces.html#jd0e229" }, { "lang": "en", "value": "You can issue show chassis at the device to determine if there are multiple MCP10\u0027s in your system. For example:\n root@device\u003e show chassis fpc pic-status\n Slot 1 Online MPC10E 3D MRATE-15xQSFPP\n PIC 0 Online MRATE-5xQSFPP\n PIC 1 Online MRATE-5xQSFPP\n PIC 2 Online MRATE-5xQSFPP\n Slot 2 Online MPC10E 3D MRATE-15xQSFPP\n PIC 0 Online MRATE-5xQSFPP\n PIC 1 Online MRATE-5xQSFPP\n PIC 2 Online MRATE-5xQSFPP\n Slot 3 Online MPC10E 3D MRATE-15xQSFPP\n PIC 0 Online MRATE-5xQSFPP\n PIC 1 Online MRATE-5xQSFPP\n PIC 2 Online MRATE-5xQSFPP" } ], "datePublic": "2019-10-09T00:00:00", "descriptions": [ { "lang": "en", "value": "This issue only affects devices with three (3) or more MPC10\u0027s installed in a single chassis with OSPF enabled and configured on the device. An Insufficient Resource Pool weakness allows an attacker to cause the device\u0027s Open Shortest Path First (OSPF) states to transition to Down, resulting in a Denial of Service (DoS) attack. This attack requires a relatively large number of specific Internet Mixed (IMIXed) types of genuine and valid IPv6 packets to be transferred by the attacker in a relatively short period of time, across three or more PFE\u0027s on the device at the same time. Continued receipt of the traffic sent by the attacker will continue to cause OSPF to remain in the Down starting state, or flap between other states and then again to Down, causing a persistent Denial of Service. This attack will affect all IPv4, and IPv6 traffic served by the OSPF routes once the OSPF states transition to Down. This issue affects: Juniper Networks Junos OS on MX480, MX960, MX2008, MX2010, MX2020: 18.1 versions prior to 18.1R2-S4, 18.1R3-S5; 18.1X75 version 18.1X75-D10 and later versions; 18.2 versions prior to 18.2R1-S5, 18.2R2-S3, 18.2R3; 18.2X75 versions prior to 18.2X75-D50; 18.3 versions prior to 18.3R1-S4, 18.3R2, 18.3R3; 18.4 versions prior to 18.4R1-S2, 18.4R2." } ], "exploits": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-410", "description": "CWE-410 Insufficient Resource Pool", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-09T19:26:17", "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "shortName": "juniper" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://kb.juniper.net/JSA10954" } ], "solutions": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: 18.1R2-S4, 18.1R3-S5, 18.2R1-S5, 18.2R2-S3, 18.2R3, 18.2X75-D50, 18.3R1-S4, 18.3R2, 18.3R3, 18.4R1-S2, 18.4R2, 19.1R1, and all subsequent releases." } ], "source": { "advisory": "JSA10954", "defect": [ "1418955" ], "discovery": "INTERNAL" }, "title": "Junos OS: MX Series: An MPC10 Denial of Service (DoS) due to OSPF states transitioning to Down, causes traffic to stop forwarding through the device.", "workarounds": [ { "lang": "en", "value": "There are no known workarounds for this issue." } ], "x_generator": { "engine": "Vulnogram 0.0.6" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "sirt@juniper.net", "DATE_PUBLIC": "2019-10-09T16:00:00.000Z", "ID": "CVE-2019-0056", "STATE": "PUBLIC", "TITLE": "Junos OS: MX Series: An MPC10 Denial of Service (DoS) due to OSPF states transitioning to Down, causes traffic to stop forwarding through the device." }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Junos OS", "version": { "version_data": [ { "platform": "MX480, MX960, MX2008, MX2010, MX2020", "version_affected": "\u003c", "version_name": "18.1", "version_value": "18.1R2-S4, 18.1R3-S5" }, { "platform": "MX480, MX960, MX2008, MX2010, MX2020", "version_affected": "\u003c", "version_name": "18.2", "version_value": "18.2R1-S5, 18.2R2-S3, 18.2R3" }, { "platform": "MX480, MX960, MX2008, MX2010, MX2020", "version_affected": "\u003c", "version_name": "18.2X75", "version_value": "18.2X75-D50" }, { "platform": "MX480, MX960, MX2008, MX2010, MX2020", "version_affected": "\u003c", "version_name": "18.3", "version_value": "18.3R1-S4, 18.3R2, 18.3R3" }, { "platform": "MX480, MX960, MX2008, MX2010, MX2020", "version_affected": "\u003c", "version_name": "18.4", "version_value": "18.4R1-S2, 18.4R2" }, { "platform": "MX480, MX960, MX2008, MX2010, MX2020", "version_affected": "\u003e=", "version_name": "18.1X75", "version_value": "18.1X75-D10" } ] } } ] }, "vendor_name": "Juniper Networks" } ] } }, "configuration": [ { "lang": "en", "value": "OSPF configuration examples can be found at https://www.juniper.net/documentation/en_US/junos/topics/topic-map/ospf-configuring-interfaces.html#jd0e229" }, { "lang": "en", "value": "You can issue show chassis at the device to determine if there are multiple MCP10\u0027s in your system. For example:\n root@device\u003e show chassis fpc pic-status\n Slot 1 Online MPC10E 3D MRATE-15xQSFPP\n PIC 0 Online MRATE-5xQSFPP\n PIC 1 Online MRATE-5xQSFPP\n PIC 2 Online MRATE-5xQSFPP\n Slot 2 Online MPC10E 3D MRATE-15xQSFPP\n PIC 0 Online MRATE-5xQSFPP\n PIC 1 Online MRATE-5xQSFPP\n PIC 2 Online MRATE-5xQSFPP\n Slot 3 Online MPC10E 3D MRATE-15xQSFPP\n PIC 0 Online MRATE-5xQSFPP\n PIC 1 Online MRATE-5xQSFPP\n PIC 2 Online MRATE-5xQSFPP" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "This issue only affects devices with three (3) or more MPC10\u0027s installed in a single chassis with OSPF enabled and configured on the device. An Insufficient Resource Pool weakness allows an attacker to cause the device\u0027s Open Shortest Path First (OSPF) states to transition to Down, resulting in a Denial of Service (DoS) attack. This attack requires a relatively large number of specific Internet Mixed (IMIXed) types of genuine and valid IPv6 packets to be transferred by the attacker in a relatively short period of time, across three or more PFE\u0027s on the device at the same time. Continued receipt of the traffic sent by the attacker will continue to cause OSPF to remain in the Down starting state, or flap between other states and then again to Down, causing a persistent Denial of Service. This attack will affect all IPv4, and IPv6 traffic served by the OSPF routes once the OSPF states transition to Down. This issue affects: Juniper Networks Junos OS on MX480, MX960, MX2008, MX2010, MX2020: 18.1 versions prior to 18.1R2-S4, 18.1R3-S5; 18.1X75 version 18.1X75-D10 and later versions; 18.2 versions prior to 18.2R1-S5, 18.2R2-S3, 18.2R3; 18.2X75 versions prior to 18.2X75-D50; 18.3 versions prior to 18.3R1-S4, 18.3R2, 18.3R3; 18.4 versions prior to 18.4R1-S2, 18.4R2." } ] }, "exploit": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "generator": { "engine": "Vulnogram 0.0.6" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-410 Insufficient Resource Pool" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.juniper.net/JSA10954", "refsource": "MISC", "url": "https://kb.juniper.net/JSA10954" } ] }, "solution": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: 18.1R2-S4, 18.1R3-S5, 18.2R1-S5, 18.2R2-S3, 18.2R3, 18.2X75-D50, 18.3R1-S4, 18.3R2, 18.3R3, 18.4R1-S2, 18.4R2, 19.1R1, and all subsequent releases." } ], "source": { "advisory": "JSA10954", "defect": [ "1418955" ], "discovery": "INTERNAL" }, "work_around": [ { "lang": "en", "value": "There are no known workarounds for this issue." } ] } } }, "cveMetadata": { "assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "assignerShortName": "juniper", "cveId": "CVE-2019-0056", "datePublished": "2019-10-09T19:26:17.416951Z", "dateReserved": "2018-10-11T00:00:00", "dateUpdated": "2024-09-16T18:29:55.944Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-0065 (GCVE-0-2019-0065)
Vulnerability from cvelistv5
Published
2019-10-09 19:26
Modified
2024-09-17 01:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- DoS
Summary
On MX Series, when the SIP ALG is enabled, receipt of a certain malformed SIP packet may crash the MS-PIC component on MS-MIC or MS-MPC. By continuously sending a crafted SIP packet, an attacker can repeatedly bring down MS-PIC on MS-MIC/MS-MPC causing a sustained Denial of Service. This issue affects Juniper Networks Junos OS on MX Series: 16.1 versions prior to 16.1R7-S5; 16.2 versions prior to 16.2R2-S11; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R3-S3; 17.3 versions prior to 17.3R3-S6 ; 17.4 versions prior to 17.4R2-S8, 17.4R3; 18.1 versions prior to 18.1R3-S3; 18.2 versions prior to 18.2R3; 18.3 versions prior to 18.3R2; 18.4 versions prior to 18.4R2.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Juniper Networks | Junos OS |
Version: 16.1 < 16.1R7-S5 Version: 16.2 < 16.2R2-S11 Version: 17.1 < 17.1R3 Version: 17.2 < 17.2R3-S3 Version: 17.3 < 17.3R3-S6 Version: 17.4 < 17.4R2-S8, 17.4R3 Version: 18.1 < 18.1R3-S3 Version: 18.2 < 18.2R3 Version: 18.3 < 18.3R2 Version: 18.4 < 18.4R2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:37:07.213Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.juniper.net/JSA10964" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "MX Series" ], "product": "Junos OS", "vendor": "Juniper Networks", "versions": [ { "lessThan": "16.1R7-S5", "status": "affected", "version": "16.1", "versionType": "custom" }, { "lessThan": "16.2R2-S11", "status": "affected", "version": "16.2", "versionType": "custom" }, { "lessThan": "17.1R3", "status": "affected", "version": "17.1", "versionType": "custom" }, { "lessThan": "17.2R3-S3", "status": "affected", "version": "17.2", "versionType": "custom" }, { "lessThan": "17.3R3-S6", "status": "affected", "version": "17.3", "versionType": "custom" }, { "lessThan": "17.4R2-S8, 17.4R3", "status": "affected", "version": "17.4", "versionType": "custom" }, { "lessThan": "18.1R3-S3", "status": "affected", "version": "18.1", "versionType": "custom" }, { "lessThan": "18.2R3", "status": "affected", "version": "18.2", "versionType": "custom" }, { "lessThan": "18.3R2", "status": "affected", "version": "18.3", "versionType": "custom" }, { "lessThan": "18.4R2", "status": "affected", "version": "18.4", "versionType": "custom" } ] } ], "configurations": [ { "lang": "en", "value": "This issue affects MX Series devices using MS-PIC, MS-MIC or MS-MPC cards with NAT in combination with the SIP ALG enabled." } ], "datePublic": "2019-10-09T00:00:00", "descriptions": [ { "lang": "en", "value": "On MX Series, when the SIP ALG is enabled, receipt of a certain malformed SIP packet may crash the MS-PIC component on MS-MIC or MS-MPC. By continuously sending a crafted SIP packet, an attacker can repeatedly bring down MS-PIC on MS-MIC/MS-MPC causing a sustained Denial of Service. This issue affects Juniper Networks Junos OS on MX Series: 16.1 versions prior to 16.1R7-S5; 16.2 versions prior to 16.2R2-S11; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R3-S3; 17.3 versions prior to 17.3R3-S6 ; 17.4 versions prior to 17.4R2-S8, 17.4R3; 18.1 versions prior to 18.1R3-S3; 18.2 versions prior to 18.2R3; 18.3 versions prior to 18.3R2; 18.4 versions prior to 18.4R2." } ], "exploits": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "DoS", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-09T19:26:17", "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "shortName": "juniper" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.juniper.net/JSA10964" } ], "solutions": [ { "lang": "en", "value": "The following software releases have been updated to resolve these specific issues: 16.1R7-S5, 16.2R2-S11, 17.1R3, 17.2R3-S3, 17.3R3-S6, 17.4R2-S8, 17.4R3, 18.1R3-S3, 18.2R3, 18.3R2, 18.4R2, 19.1R1, and all subsequent releases." } ], "source": { "advisory": "JSA10964", "defect": [ "1405423" ], "discovery": "USER" }, "title": "Junos OS: MX Series: Denial of Service vulnerability in MS-PIC component on MS-MIC or MS-MPC", "workarounds": [ { "lang": "en", "value": "Disable the use of the SIP application layer gateway (ALG) configuration if not needed." } ], "x_generator": { "engine": "Vulnogram 0.0.6" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "sirt@juniper.net", "DATE_PUBLIC": "2019-10-09T16:00:00.000Z", "ID": "CVE-2019-0065", "STATE": "PUBLIC", "TITLE": "Junos OS: MX Series: Denial of Service vulnerability in MS-PIC component on MS-MIC or MS-MPC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Junos OS", "version": { "version_data": [ { "platform": "MX Series", "version_affected": "\u003c", "version_name": "16.1", "version_value": "16.1R7-S5" }, { "platform": "MX Series", "version_affected": "\u003c", "version_name": "16.2", "version_value": "16.2R2-S11" }, { "platform": "MX Series", "version_affected": "\u003c", "version_name": "17.1", "version_value": "17.1R3" }, { "platform": "MX Series", "version_affected": "\u003c", "version_name": "17.2", "version_value": "17.2R3-S3" }, { "platform": "MX Series", "version_affected": "\u003c", "version_name": "17.3", "version_value": "17.3R3-S6" }, { "platform": "MX Series", "version_affected": "\u003c", "version_name": "17.4", "version_value": "17.4R2-S8, 17.4R3" }, { "platform": "MX Series", "version_affected": "\u003c", "version_name": "18.1", "version_value": "18.1R3-S3" }, { "platform": "MX Series", "version_affected": "\u003c", "version_name": "18.2", "version_value": "18.2R3" }, { "platform": "MX Series", "version_affected": "\u003c", "version_name": "18.3", "version_value": "18.3R2" }, { "platform": "MX Series", "version_affected": "\u003c", "version_name": "18.4", "version_value": "18.4R2" } ] } } ] }, "vendor_name": "Juniper Networks" } ] } }, "configuration": [ { "lang": "en", "value": "This issue affects MX Series devices using MS-PIC, MS-MIC or MS-MPC cards with NAT in combination with the SIP ALG enabled." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "On MX Series, when the SIP ALG is enabled, receipt of a certain malformed SIP packet may crash the MS-PIC component on MS-MIC or MS-MPC. By continuously sending a crafted SIP packet, an attacker can repeatedly bring down MS-PIC on MS-MIC/MS-MPC causing a sustained Denial of Service. This issue affects Juniper Networks Junos OS on MX Series: 16.1 versions prior to 16.1R7-S5; 16.2 versions prior to 16.2R2-S11; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R3-S3; 17.3 versions prior to 17.3R3-S6 ; 17.4 versions prior to 17.4R2-S8, 17.4R3; 18.1 versions prior to 18.1R3-S3; 18.2 versions prior to 18.2R3; 18.3 versions prior to 18.3R2; 18.4 versions prior to 18.4R2." } ] }, "exploit": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "generator": { "engine": "Vulnogram 0.0.6" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "DoS" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.juniper.net/JSA10964", "refsource": "CONFIRM", "url": "https://kb.juniper.net/JSA10964" } ] }, "solution": [ { "lang": "en", "value": "The following software releases have been updated to resolve these specific issues: 16.1R7-S5, 16.2R2-S11, 17.1R3, 17.2R3-S3, 17.3R3-S6, 17.4R2-S8, 17.4R3, 18.1R3-S3, 18.2R3, 18.3R2, 18.4R2, 19.1R1, and all subsequent releases." } ], "source": { "advisory": "JSA10964", "defect": [ "1405423" ], "discovery": "USER" }, "work_around": [ { "lang": "en", "value": "Disable the use of the SIP application layer gateway (ALG) configuration if not needed." } ] } } }, "cveMetadata": { "assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "assignerShortName": "juniper", "cveId": "CVE-2019-0065", "datePublished": "2019-10-09T19:26:17.784138Z", "dateReserved": "2018-10-11T00:00:00", "dateUpdated": "2024-09-17T01:41:39.203Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-0055 (GCVE-0-2019-0055)
Vulnerability from cvelistv5
Published
2019-10-09 19:26
Modified
2024-09-16 22:08
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-130 - Improper Handling of Length Parameter Inconsistency
Summary
A vulnerability in the SIP ALG packet processing service of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) to the device by sending specific types of valid SIP traffic to the device. In this case, the flowd process crashes and generates a core dump while processing SIP ALG traffic. Continued receipt of these valid SIP packets will result in a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS: 12.3X48 versions prior to 12.3X48-D61, 12.3X48-D65 on SRX Series; 15.1X49 versions prior to 15.1X49-D130 on SRX Series; 17.3 versions prior to 17.3R3 on SRX Series; 17.4 versions prior to 17.4R2 on SRX Series.
References
URL | Tags | |||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Juniper Networks | Junos OS |
Version: 12.3X48 < 12.3X48-D61, 12.3X48-D65 Version: 15.1X49 < 15.1X49-D130 Version: 17.3 < 17.3R3 Version: 17.4 < 17.4R2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:37:07.401Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.juniper.net/JSA10953" }, { "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-sip-alg.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "SRX Series" ], "product": "Junos OS", "vendor": "Juniper Networks", "versions": [ { "lessThan": "12.3X48-D61, 12.3X48-D65", "status": "affected", "version": "12.3X48", "versionType": "custom" }, { "lessThan": "15.1X49-D130", "status": "affected", "version": "15.1X49", "versionType": "custom" }, { "lessThan": "17.3R3", "status": "affected", "version": "17.3", "versionType": "custom" }, { "lessThan": "17.4R2", "status": "affected", "version": "17.4", "versionType": "custom" } ] } ], "configurations": [ { "lang": "en", "value": "This issue only affects SRX Series devices where SIP ALG is enabled.\nThe following minimum configuration is required: \n set security alg sip" } ], "datePublic": "2019-10-09T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the SIP ALG packet processing service of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) to the device by sending specific types of valid SIP traffic to the device. In this case, the flowd process crashes and generates a core dump while processing SIP ALG traffic. Continued receipt of these valid SIP packets will result in a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS: 12.3X48 versions prior to 12.3X48-D61, 12.3X48-D65 on SRX Series; 15.1X49 versions prior to 15.1X49-D130 on SRX Series; 17.3 versions prior to 17.3R3 on SRX Series; 17.4 versions prior to 17.4R2 on SRX Series." } ], "exploits": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-130", "description": "CWE-130 Improper Handling of Length Parameter Inconsistency", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-09T19:26:17", "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "shortName": "juniper" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://kb.juniper.net/JSA10953" }, { "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-sip-alg.html" } ], "solutions": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: 12.3X48-D61, 12.3X48-D65, 15.1X49-D130, 17.3R3, 17.4R2, 18.1R1, and all subsequent releases." } ], "source": { "advisory": "JSA10953", "defect": [ "1329170" ], "discovery": "USER" }, "title": "Junos OS: SRX Series: An attacker may cause flowd to crash by sending certain valid SIP traffic to a device with SIP ALG enabled.", "workarounds": [ { "lang": "en", "value": "Disable SIP ALG if this is not needed, otherwise there are no viable workarounds for this issue." } ], "x_generator": { "engine": "Vulnogram 0.0.6" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "sirt@juniper.net", "DATE_PUBLIC": "2019-10-09T16:00:00.000Z", "ID": "CVE-2019-0055", "STATE": "PUBLIC", "TITLE": "Junos OS: SRX Series: An attacker may cause flowd to crash by sending certain valid SIP traffic to a device with SIP ALG enabled." }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Junos OS", "version": { "version_data": [ { "platform": "SRX Series", "version_affected": "\u003c", "version_name": "12.3X48", "version_value": "12.3X48-D61, 12.3X48-D65" }, { "platform": "SRX Series", "version_affected": "\u003c", "version_name": "15.1X49", "version_value": "15.1X49-D130" }, { "platform": "SRX Series", "version_affected": "\u003c", "version_name": "17.3", "version_value": "17.3R3" }, { "platform": "SRX Series", "version_affected": "\u003c", "version_name": "17.4", "version_value": "17.4R2" } ] } } ] }, "vendor_name": "Juniper Networks" } ] } }, "configuration": [ { "lang": "en", "value": "This issue only affects SRX Series devices where SIP ALG is enabled.\nThe following minimum configuration is required: \n set security alg sip" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the SIP ALG packet processing service of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) to the device by sending specific types of valid SIP traffic to the device. In this case, the flowd process crashes and generates a core dump while processing SIP ALG traffic. Continued receipt of these valid SIP packets will result in a sustained Denial of Service (DoS) condition. This issue affects: Juniper Networks Junos OS: 12.3X48 versions prior to 12.3X48-D61, 12.3X48-D65 on SRX Series; 15.1X49 versions prior to 15.1X49-D130 on SRX Series; 17.3 versions prior to 17.3R3 on SRX Series; 17.4 versions prior to 17.4R2 on SRX Series." } ] }, "exploit": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "generator": { "engine": "Vulnogram 0.0.6" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-130 Improper Handling of Length Parameter Inconsistency" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.juniper.net/JSA10953", "refsource": "MISC", "url": "https://kb.juniper.net/JSA10953" }, { "name": "https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-sip-alg.html", "refsource": "MLIST", "url": "https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-sip-alg.html" } ] }, "solution": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: 12.3X48-D61, 12.3X48-D65, 15.1X49-D130, 17.3R3, 17.4R2, 18.1R1, and all subsequent releases." } ], "source": { "advisory": "JSA10953", "defect": [ "1329170" ], "discovery": "USER" }, "work_around": [ { "lang": "en", "value": "Disable SIP ALG if this is not needed, otherwise there are no viable workarounds for this issue." } ] } } }, "cveMetadata": { "assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "assignerShortName": "juniper", "cveId": "CVE-2019-0055", "datePublished": "2019-10-09T19:26:17.374648Z", "dateReserved": "2018-10-11T00:00:00", "dateUpdated": "2024-09-16T22:08:51.402Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-0058 (GCVE-0-2019-0058)
Vulnerability from cvelistv5
Published
2019-10-09 19:26
Modified
2024-09-16 17:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- 252 - Unchecked Return Value
Summary
A vulnerability in the Veriexec subsystem of Juniper Networks Junos OS allowing an attacker to fully compromise the host system. A local authenticated user can elevate privileges to gain full control of the system even if they are specifically denied access to perform certain actions. This issue affects: Juniper Networks Junos OS: 12.3X48 versions prior to 12.3X48-D80 on SRX Series.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Juniper Networks | Junos OS |
Version: 12.3X48 < 12.3X48-D80 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:37:07.220Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.juniper.net/JSA10956" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "SRX Series" ], "product": "Junos OS", "vendor": "Juniper Networks", "versions": [ { "lessThan": "12.3X48-D80", "status": "affected", "version": "12.3X48", "versionType": "custom" } ] } ], "configurations": [ { "lang": "en", "value": "This requires a local authenticated user to have shell privilege." } ], "datePublic": "2019-10-09T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Veriexec subsystem of Juniper Networks Junos OS allowing an attacker to fully compromise the host system. A local authenticated user can elevate privileges to gain full control of the system even if they are specifically denied access to perform certain actions. This issue affects: Juniper Networks Junos OS: 12.3X48 versions prior to 12.3X48-D80 on SRX Series." } ], "exploits": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "252 - Unchecked Return Value", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-09T19:26:17", "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "shortName": "juniper" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://kb.juniper.net/JSA10956" } ], "solutions": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: Junos OS: 12.3X48-D80 and all subsequent releases." } ], "source": { "advisory": "JSA10956", "defect": [ "975878" ], "discovery": "INTERNAL" }, "title": "Junos OS: SRX Series: A weakness in the Veriexec subsystem may allow privilege escalation.", "workarounds": [ { "lang": "en", "value": "To reduce the risk of exploitation of this vulnerability, customers should limit access to the Junos shell to only trusted administrators and limit their actions to previously reviewed and agreed-upon commands and command arguments as part of a structured change management workflow. Shell commands which are run should be logged and reviewed as part of standard security practices." } ], "x_generator": { "engine": "Vulnogram 0.0.6" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "sirt@juniper.net", "DATE_PUBLIC": "2019-10-09T16:00:00.000Z", "ID": "CVE-2019-0058", "STATE": "PUBLIC", "TITLE": "Junos OS: SRX Series: A weakness in the Veriexec subsystem may allow privilege escalation." }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Junos OS", "version": { "version_data": [ { "platform": "SRX Series", "version_affected": "\u003c", "version_name": "12.3X48", "version_value": "12.3X48-D80" } ] } } ] }, "vendor_name": "Juniper Networks" } ] } }, "configuration": [ { "lang": "en", "value": "This requires a local authenticated user to have shell privilege." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the Veriexec subsystem of Juniper Networks Junos OS allowing an attacker to fully compromise the host system. A local authenticated user can elevate privileges to gain full control of the system even if they are specifically denied access to perform certain actions. This issue affects: Juniper Networks Junos OS: 12.3X48 versions prior to 12.3X48-D80 on SRX Series." } ] }, "exploit": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "generator": { "engine": "Vulnogram 0.0.6" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "252 - Unchecked Return Value" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.juniper.net/JSA10956", "refsource": "MISC", "url": "https://kb.juniper.net/JSA10956" } ] }, "solution": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: Junos OS: 12.3X48-D80 and all subsequent releases." } ], "source": { "advisory": "JSA10956", "defect": [ "975878" ], "discovery": "INTERNAL" }, "work_around": [ { "lang": "en", "value": "To reduce the risk of exploitation of this vulnerability, customers should limit access to the Junos shell to only trusted administrators and limit their actions to previously reviewed and agreed-upon commands and command arguments as part of a structured change management workflow. Shell commands which are run should be logged and reviewed as part of standard security practices." } ] } } }, "cveMetadata": { "assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "assignerShortName": "juniper", "cveId": "CVE-2019-0058", "datePublished": "2019-10-09T19:26:17.497824Z", "dateReserved": "2018-10-11T00:00:00", "dateUpdated": "2024-09-16T17:49:17.709Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-0063 (GCVE-0-2019-0063)
Vulnerability from cvelistv5
Published
2019-10-09 19:26
Modified
2024-09-17 00:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial of Service (DoS)
Summary
When an MX Series Broadband Remote Access Server (BRAS) is configured as a Broadband Network Gateway (BNG) with DHCPv6 enabled, jdhcpd might crash when receiving a specific crafted DHCP response message on a subscriber interface. The daemon automatically restarts without intervention, but continuous receipt of specific crafted DHCP messages will repeatedly crash jdhcpd, leading to an extended Denial of Service (DoS) condition. This issue only affects systems configured with DHCPv6 enabled. DHCPv4 is unaffected by this issue. This issue affects Juniper Networks Junos OS: 15.1 versions prior to 15.1R7-S5 on MX Series; 16.1 versions prior to 16.1R7-S5 on MX Series; 16.2 versions prior to 16.2R2-S10 on MX Series; 17.1 versions prior to 17.1R3-S1 on MX Series; 17.2 versions prior to 17.2R3-S2 on MX Series; 17.3 versions prior to 17.3R3-S6 on MX Series; 17.4 versions prior to 17.4R2-S5, 17.4R3 on MX Series; 18.1 versions prior to 18.1R3-S6 on MX Series; 18.2 versions prior to 18.2R2-S4, 18.2R3 on MX Series; 18.2X75 versions prior to 18.2X75-D50 on MX Series; 18.3 versions prior to 18.3R1-S5, 18.3R3 on MX Series; 18.4 versions prior to 18.4R2 on MX Series; 19.1 versions prior to 19.1R1-S2, 19.1R2 on MX Series.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Juniper Networks | Junos OS |
Version: 15.1 < 15.1R7-S5 Version: 16.1 < 16.1R7-S5 Version: 16.2 < 16.2R2-S10 Version: 17.1 < 17.1R3-S1 Version: 17.2 < 17.2R3-S2 Version: 17.3 < 17.3R3-S6 Version: 17.4 < 17.4R2-S5, 17.4R3 Version: 18.1 < 18.1R3-S6 Version: 18.2 < 18.2R2-S4, 18.2R3 Version: 18.2X75 < 18.2X75-D50 Version: 18.3 < 18.3R1-S5, 18.3R3 Version: 18.4 < 18.4R2 Version: 19.1 < 19.1R1-S2, 19.1R2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:37:07.560Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.juniper.net/JSA10962" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "MX Series" ], "product": "Junos OS", "vendor": "Juniper Networks", "versions": [ { "lessThan": "15.1R7-S5", "status": "affected", "version": "15.1", "versionType": "custom" }, { "lessThan": "16.1R7-S5", "status": "affected", "version": "16.1", "versionType": "custom" }, { "lessThan": "16.2R2-S10", "status": "affected", "version": "16.2", "versionType": "custom" }, { "lessThan": "17.1R3-S1", "status": "affected", "version": "17.1", "versionType": "custom" }, { "lessThan": "17.2R3-S2", "status": "affected", "version": "17.2", "versionType": "custom" }, { "lessThan": "17.3R3-S6", "status": "affected", "version": "17.3", "versionType": "custom" }, { "lessThan": "17.4R2-S5, 17.4R3", "status": "affected", "version": "17.4", "versionType": "custom" }, { "lessThan": "18.1R3-S6", "status": "affected", "version": "18.1", "versionType": "custom" }, { "lessThan": "18.2R2-S4, 18.2R3", "status": "affected", "version": "18.2", "versionType": "custom" }, { "lessThan": "18.2X75-D50", "status": "affected", "version": "18.2X75", "versionType": "custom" }, { "lessThan": "18.3R1-S5, 18.3R3", "status": "affected", "version": "18.3", "versionType": "custom" }, { "lessThan": "18.4R2", "status": "affected", "version": "18.4", "versionType": "custom" }, { "lessThan": "19.1R1-S2, 19.1R2", "status": "affected", "version": "19.1", "versionType": "custom" } ] } ], "configurations": [ { "lang": "en", "value": "Systems with DHCPv6 enabled will include a configuration similar to:\n [edit system services]\n dhcp-local-server {\n dhcpv6 {\n..." } ], "datePublic": "2019-10-09T00:00:00", "descriptions": [ { "lang": "en", "value": "When an MX Series Broadband Remote Access Server (BRAS) is configured as a Broadband Network Gateway (BNG) with DHCPv6 enabled, jdhcpd might crash when receiving a specific crafted DHCP response message on a subscriber interface. The daemon automatically restarts without intervention, but continuous receipt of specific crafted DHCP messages will repeatedly crash jdhcpd, leading to an extended Denial of Service (DoS) condition. This issue only affects systems configured with DHCPv6 enabled. DHCPv4 is unaffected by this issue. This issue affects Juniper Networks Junos OS: 15.1 versions prior to 15.1R7-S5 on MX Series; 16.1 versions prior to 16.1R7-S5 on MX Series; 16.2 versions prior to 16.2R2-S10 on MX Series; 17.1 versions prior to 17.1R3-S1 on MX Series; 17.2 versions prior to 17.2R3-S2 on MX Series; 17.3 versions prior to 17.3R3-S6 on MX Series; 17.4 versions prior to 17.4R2-S5, 17.4R3 on MX Series; 18.1 versions prior to 18.1R3-S6 on MX Series; 18.2 versions prior to 18.2R2-S4, 18.2R3 on MX Series; 18.2X75 versions prior to 18.2X75-D50 on MX Series; 18.3 versions prior to 18.3R1-S5, 18.3R3 on MX Series; 18.4 versions prior to 18.4R2 on MX Series; 19.1 versions prior to 19.1R1-S2, 19.1R2 on MX Series." } ], "exploits": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service (DoS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-09T19:26:17", "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "shortName": "juniper" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://kb.juniper.net/JSA10962" } ], "solutions": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: 15.1R7-S5, 16.1R7-S5, 16.2R2-S10, 17.1R3-S1, 17.2R3-S2, 17.3R3-S6, 17.4R2-S5, 17.4R3, 18.1R3-S6, 18.2R2-S4, 18.2R3, 18.2X75-D50, 18.3R1-S5, 18.3R3, 18.4R2, 19.1R1-S2, 19.1R2, 19.2R1, and all subsequent releases." } ], "source": { "advisory": "JSA10962", "defect": [ "1415242" ], "discovery": "USER" }, "title": "Junos OS: MX Series: jdhcpd crash when receiving a specific crafted DHCP response message", "workarounds": [ { "lang": "en", "value": "There are no viable workarounds for this issue." } ], "x_generator": { "engine": "Vulnogram 0.0.8" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "sirt@juniper.net", "DATE_PUBLIC": "2019-10-09T16:00:00.000Z", "ID": "CVE-2019-0063", "STATE": "PUBLIC", "TITLE": "Junos OS: MX Series: jdhcpd crash when receiving a specific crafted DHCP response message" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Junos OS", "version": { "version_data": [ { "platform": "MX Series", "version_affected": "\u003c", "version_name": "15.1", "version_value": "15.1R7-S5" }, { "platform": "MX Series", "version_affected": "\u003c", "version_name": "16.1", "version_value": "16.1R7-S5" }, { "platform": "MX Series", "version_affected": "\u003c", "version_name": "16.2", "version_value": "16.2R2-S10" }, { "platform": "MX Series", "version_affected": "\u003c", "version_name": "17.1", "version_value": "17.1R3-S1" }, { "platform": "MX Series", "version_affected": "\u003c", "version_name": "17.2", "version_value": "17.2R3-S2" }, { "platform": "MX Series", "version_affected": "\u003c", "version_name": "17.3", "version_value": "17.3R3-S6" }, { "platform": "MX Series", "version_affected": "\u003c", "version_name": "17.4", "version_value": "17.4R2-S5, 17.4R3" }, { "platform": "MX Series", "version_affected": "\u003c", "version_name": "18.1", "version_value": "18.1R3-S6" }, { "platform": "MX Series", "version_affected": "\u003c", "version_name": "18.2", "version_value": "18.2R2-S4, 18.2R3" }, { "platform": "MX Series", "version_affected": "\u003c", "version_name": "18.2X75", "version_value": "18.2X75-D50" }, { "platform": "MX Series", "version_affected": "\u003c", "version_name": "18.3", "version_value": "18.3R1-S5, 18.3R3" }, { "platform": "MX Series", "version_affected": "\u003c", "version_name": "18.4", "version_value": "18.4R2" }, { "platform": "MX Series", "version_affected": "\u003c", "version_name": "19.1", "version_value": "19.1R1-S2, 19.1R2" } ] } } ] }, "vendor_name": "Juniper Networks" } ] } }, "configuration": [ { "lang": "en", "value": "Systems with DHCPv6 enabled will include a configuration similar to:\n [edit system services]\n dhcp-local-server {\n dhcpv6 {\n..." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "When an MX Series Broadband Remote Access Server (BRAS) is configured as a Broadband Network Gateway (BNG) with DHCPv6 enabled, jdhcpd might crash when receiving a specific crafted DHCP response message on a subscriber interface. The daemon automatically restarts without intervention, but continuous receipt of specific crafted DHCP messages will repeatedly crash jdhcpd, leading to an extended Denial of Service (DoS) condition. This issue only affects systems configured with DHCPv6 enabled. DHCPv4 is unaffected by this issue. This issue affects Juniper Networks Junos OS: 15.1 versions prior to 15.1R7-S5 on MX Series; 16.1 versions prior to 16.1R7-S5 on MX Series; 16.2 versions prior to 16.2R2-S10 on MX Series; 17.1 versions prior to 17.1R3-S1 on MX Series; 17.2 versions prior to 17.2R3-S2 on MX Series; 17.3 versions prior to 17.3R3-S6 on MX Series; 17.4 versions prior to 17.4R2-S5, 17.4R3 on MX Series; 18.1 versions prior to 18.1R3-S6 on MX Series; 18.2 versions prior to 18.2R2-S4, 18.2R3 on MX Series; 18.2X75 versions prior to 18.2X75-D50 on MX Series; 18.3 versions prior to 18.3R1-S5, 18.3R3 on MX Series; 18.4 versions prior to 18.4R2 on MX Series; 19.1 versions prior to 19.1R1-S2, 19.1R2 on MX Series." } ] }, "exploit": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "generator": { "engine": "Vulnogram 0.0.8" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service (DoS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.juniper.net/JSA10962", "refsource": "MISC", "url": "https://kb.juniper.net/JSA10962" } ] }, "solution": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: 15.1R7-S5, 16.1R7-S5, 16.2R2-S10, 17.1R3-S1, 17.2R3-S2, 17.3R3-S6, 17.4R2-S5, 17.4R3, 18.1R3-S6, 18.2R2-S4, 18.2R3, 18.2X75-D50, 18.3R1-S5, 18.3R3, 18.4R2, 19.1R1-S2, 19.1R2, 19.2R1, and all subsequent releases." } ], "source": { "advisory": "JSA10962", "defect": [ "1415242" ], "discovery": "USER" }, "work_around": [ { "lang": "en", "value": "There are no viable workarounds for this issue." } ] } } }, "cveMetadata": { "assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "assignerShortName": "juniper", "cveId": "CVE-2019-0063", "datePublished": "2019-10-09T19:26:17.701474Z", "dateReserved": "2018-10-11T00:00:00", "dateUpdated": "2024-09-17T00:06:05.419Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-0062 (GCVE-0-2019-0062)
Vulnerability from cvelistv5
Published
2019-10-09 19:26
Modified
2024-09-16 22:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-384 - Session Fixation
Summary
A session fixation vulnerability in J-Web on Junos OS may allow an attacker to use social engineering techniques to fix and hijack a J-Web administrators web session and potentially gain administrative access to the device. This issue affects: Juniper Networks Junos OS 12.3 versions prior to 12.3R12-S15 on EX Series; 12.3X48 versions prior to 12.3X48-D85 on SRX Series; 14.1X53 versions prior to 14.1X53-D51; 15.1 versions prior to 15.1F6-S13, 15.1R7-S5; 15.1X49 versions prior to 15.1X49-D180 on SRX Series; 15.1X53 versions prior to 15.1X53-D238; 16.1 versions prior to 16.1R4-S13, 16.1R7-S5; 16.2 versions prior to 16.2R2-S10; 17.1 versions prior to 17.1R3-S1; 17.2 versions prior to 17.2R2-S8, 17.2R3-S3; 17.3 versions prior to 17.3R3-S5; 17.4 versions prior to 17.4R2-S8, 17.4R3; 18.1 versions prior to 18.1R3-S8; 18.2 versions prior to 18.2R3; 18.3 versions prior to 18.3R3; 18.4 versions prior to 18.4R2; 19.1 versions prior to 19.1R1-S2, 19.1R2.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Juniper Networks | Junos OS |
Version: 12.3 < 12.3R12-S15 |
||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:37:07.823Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kb.juniper.net/JSA10961" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "EX Series" ], "product": "Junos OS", "vendor": "Juniper Networks", "versions": [ { "lessThan": "12.3R12-S15", "status": "affected", "version": "12.3", "versionType": "custom" } ] }, { "platforms": [ "SRX Series" ], "product": "Junos OS", "vendor": "Juniper Networks", "versions": [ { "lessThan": "12.3X48-D85", "status": "affected", "version": "12.3X48", "versionType": "custom" }, { "lessThan": "15.1X49-D180", "status": "affected", "version": "15.1X49", "versionType": "custom" } ] }, { "product": "Junos OS", "vendor": "Juniper Networks", "versions": [ { "lessThan": "14.1X53-D51", "status": "affected", "version": "14.1X53", "versionType": "custom" }, { "lessThan": "15.1F6-S13, 15.1R7-S5", "status": "affected", "version": "15.1", "versionType": "custom" }, { "lessThan": "15.1X53-D238", "status": "affected", "version": "15.1X53", "versionType": "custom" }, { "lessThan": "16.1R4-S13, 16.1R7-S5", "status": "affected", "version": "16.1", "versionType": "custom" }, { "lessThan": "16.2R2-S10", "status": "affected", "version": "16.2", "versionType": "custom" }, { "lessThan": "17.1R3-S1", "status": "affected", "version": "17.1", "versionType": "custom" }, { "lessThan": "17.2R2-S8, 17.2R3-S3", "status": "affected", "version": "17.2", "versionType": "custom" }, { "lessThan": "17.3R3-S5", "status": "affected", "version": "17.3", "versionType": "custom" }, { "lessThan": "17.4R2-S8, 17.4R3", "status": "affected", "version": "17.4", "versionType": "custom" }, { "lessThan": "18.1R3-S8", "status": "affected", "version": "18.1", "versionType": "custom" }, { "lessThan": "18.2R3", "status": "affected", "version": "18.2", "versionType": "custom" }, { "lessThan": "18.3R3", "status": "affected", "version": "18.3", "versionType": "custom" }, { "lessThan": "18.4R2", "status": "affected", "version": "18.4", "versionType": "custom" }, { "lessThan": "19.1R1-S2, 19.1R2", "status": "affected", "version": "19.1", "versionType": "custom" } ] } ], "configurations": [ { "lang": "en", "value": "This issue requires J-Web to be enabled on the device.\n\nThe examples of the config stanza affected by this issue:\n system services web-management http\n system services web-management https" } ], "credits": [ { "lang": "en", "value": "Farid Heydari" } ], "datePublic": "2019-10-09T00:00:00", "descriptions": [ { "lang": "en", "value": "A session fixation vulnerability in J-Web on Junos OS may allow an attacker to use social engineering techniques to fix and hijack a J-Web administrators web session and potentially gain administrative access to the device. This issue affects: Juniper Networks Junos OS 12.3 versions prior to 12.3R12-S15 on EX Series; 12.3X48 versions prior to 12.3X48-D85 on SRX Series; 14.1X53 versions prior to 14.1X53-D51; 15.1 versions prior to 15.1F6-S13, 15.1R7-S5; 15.1X49 versions prior to 15.1X49-D180 on SRX Series; 15.1X53 versions prior to 15.1X53-D238; 16.1 versions prior to 16.1R4-S13, 16.1R7-S5; 16.2 versions prior to 16.2R2-S10; 17.1 versions prior to 17.1R3-S1; 17.2 versions prior to 17.2R2-S8, 17.2R3-S3; 17.3 versions prior to 17.3R3-S5; 17.4 versions prior to 17.4R2-S8, 17.4R3; 18.1 versions prior to 18.1R3-S8; 18.2 versions prior to 18.2R3; 18.3 versions prior to 18.3R3; 18.4 versions prior to 18.4R2; 19.1 versions prior to 19.1R1-S2, 19.1R2." } ], "exploits": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-384", "description": "CWE-384 Session Fixation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-09T19:26:17", "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "shortName": "juniper" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kb.juniper.net/JSA10961" } ], "solutions": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: 12.3R12-S15*, 12.3X48-D85, 14.1X53-D51, 15.1F6-S13, 15.1R7-S5, 15.1X49-D180, 15.1X53-D238, 16.1R4-S13, 16.1R7-S5, 16.2R2-S10, 17.1R3-S1, 17.2R2-S8, 17.2R3-S3, 17.3R3-S5, 17.4R2-S8, 17.4R3*, 18.1R3-S8*, 18.2R3, 18.3R3, 18.4R2, 19.1R1-S2, 19.1R2, 19.2R1, and all subsequent releases.\n*pending publication" } ], "source": { "advisory": "JSA10961", "defect": [ "1410401" ], "discovery": "EXTERNAL" }, "title": "Junos OS: Session fixation vulnerability in J-Web", "workarounds": [ { "lang": "en", "value": "Use access control lists or firewall filters to limit access to Junos J-Web interface to only trusted users and networks to reduce risks of exploitation of this vulnerability.\n\nUsing common BCPs of safe web browsing such as not clicking on links in email or other media would reduce risks of exploitation of this vulnerability.\n\nDisabling J-Web would completely prevent any exploitation of this issue." } ], "x_generator": { "engine": "Vulnogram 0.0.8" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "sirt@juniper.net", "DATE_PUBLIC": "2019-10-09T16:00:00.000Z", "ID": "CVE-2019-0062", "STATE": "PUBLIC", "TITLE": "Junos OS: Session fixation vulnerability in J-Web" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Junos OS", "version": { "version_data": [ { "platform": "EX Series", "version_affected": "\u003c", "version_name": "12.3", "version_value": "12.3R12-S15" }, { "platform": "SRX Series", "version_affected": "\u003c", "version_name": "12.3X48", "version_value": "12.3X48-D85" }, { "version_affected": "\u003c", "version_name": "14.1X53", "version_value": "14.1X53-D51" }, { "version_affected": "\u003c", "version_name": "15.1", "version_value": "15.1F6-S13, 15.1R7-S5" }, { "platform": "SRX Series", "version_affected": "\u003c", "version_name": "15.1X49", "version_value": "15.1X49-D180" }, { "version_affected": "\u003c", "version_name": "15.1X53", "version_value": "15.1X53-D238" }, { "version_affected": "\u003c", "version_name": "16.1", "version_value": "16.1R4-S13, 16.1R7-S5" }, { "version_affected": "\u003c", "version_name": "16.2", "version_value": "16.2R2-S10" }, { "version_affected": "\u003c", "version_name": "17.1", "version_value": "17.1R3-S1" }, { "version_affected": "\u003c", "version_name": "17.2", "version_value": "17.2R2-S8, 17.2R3-S3" }, { "version_affected": "\u003c", "version_name": "17.3", "version_value": "17.3R3-S5" }, { "version_affected": "\u003c", "version_name": "17.4", "version_value": "17.4R2-S8, 17.4R3" }, { "version_affected": "\u003c", "version_name": "18.1", "version_value": "18.1R3-S8" }, { "version_affected": "\u003c", "version_name": "18.2", "version_value": "18.2R3" }, { "version_affected": "\u003c", "version_name": "18.3", "version_value": "18.3R3" }, { "version_affected": "\u003c", "version_name": "18.4", "version_value": "18.4R2" }, { "version_affected": "\u003c", "version_name": "19.1", "version_value": "19.1R1-S2, 19.1R2" } ] } } ] }, "vendor_name": "Juniper Networks" } ] } }, "configuration": [ { "lang": "en", "value": "This issue requires J-Web to be enabled on the device.\n\nThe examples of the config stanza affected by this issue:\n system services web-management http\n system services web-management https" } ], "credit": [ { "lang": "eng", "value": "Farid Heydari" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A session fixation vulnerability in J-Web on Junos OS may allow an attacker to use social engineering techniques to fix and hijack a J-Web administrators web session and potentially gain administrative access to the device. This issue affects: Juniper Networks Junos OS 12.3 versions prior to 12.3R12-S15 on EX Series; 12.3X48 versions prior to 12.3X48-D85 on SRX Series; 14.1X53 versions prior to 14.1X53-D51; 15.1 versions prior to 15.1F6-S13, 15.1R7-S5; 15.1X49 versions prior to 15.1X49-D180 on SRX Series; 15.1X53 versions prior to 15.1X53-D238; 16.1 versions prior to 16.1R4-S13, 16.1R7-S5; 16.2 versions prior to 16.2R2-S10; 17.1 versions prior to 17.1R3-S1; 17.2 versions prior to 17.2R2-S8, 17.2R3-S3; 17.3 versions prior to 17.3R3-S5; 17.4 versions prior to 17.4R2-S8, 17.4R3; 18.1 versions prior to 18.1R3-S8; 18.2 versions prior to 18.2R3; 18.3 versions prior to 18.3R3; 18.4 versions prior to 18.4R2; 19.1 versions prior to 19.1R1-S2, 19.1R2." } ] }, "exploit": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "generator": { "engine": "Vulnogram 0.0.8" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-384 Session Fixation" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.juniper.net/JSA10961", "refsource": "CONFIRM", "url": "https://kb.juniper.net/JSA10961" } ] }, "solution": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: 12.3R12-S15*, 12.3X48-D85, 14.1X53-D51, 15.1F6-S13, 15.1R7-S5, 15.1X49-D180, 15.1X53-D238, 16.1R4-S13, 16.1R7-S5, 16.2R2-S10, 17.1R3-S1, 17.2R2-S8, 17.2R3-S3, 17.3R3-S5, 17.4R2-S8, 17.4R3*, 18.1R3-S8*, 18.2R3, 18.3R3, 18.4R2, 19.1R1-S2, 19.1R2, 19.2R1, and all subsequent releases.\n*pending publication" } ], "source": { "advisory": "JSA10961", "defect": [ "1410401" ], "discovery": "EXTERNAL" }, "work_around": [ { "lang": "en", "value": "Use access control lists or firewall filters to limit access to Junos J-Web interface to only trusted users and networks to reduce risks of exploitation of this vulnerability.\n\nUsing common BCPs of safe web browsing such as not clicking on links in email or other media would reduce risks of exploitation of this vulnerability.\n\nDisabling J-Web would completely prevent any exploitation of this issue." } ] } } }, "cveMetadata": { "assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "assignerShortName": "juniper", "cveId": "CVE-2019-0062", "datePublished": "2019-10-09T19:26:17.658174Z", "dateReserved": "2018-10-11T00:00:00", "dateUpdated": "2024-09-16T22:50:43.676Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-0054 (GCVE-0-2019-0054)
Vulnerability from cvelistv5
Published
2019-10-09 19:26
Modified
2024-09-17 00:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
An Improper Certificate Validation weakness in the SRX Series Application Identification (app-id) signature update client of Juniper Networks Junos OS allows an attacker to perform Man-in-the-Middle (MitM) attacks which may compromise the integrity and confidentiality of the device. This issue affects: Juniper Networks Junos OS 15.1X49 versions prior to 15.1X49-D120 on SRX Series devices. No other versions of Junos OS are affected.
References
URL | Tags | |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Juniper Networks | Junos OS |
Version: 15.1X49 < 15.1X49-D120 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:37:07.223Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.juniper.net/JSA10952" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-application-identification-overview.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "SRX Series" ], "product": "Junos OS", "vendor": "Juniper Networks", "versions": [ { "lessThan": "15.1X49-D120", "status": "affected", "version": "15.1X49", "versionType": "custom" } ] } ], "configurations": [ { "lang": "en", "value": "The following minimum configuration is required:\n services application-identification" } ], "datePublic": "2019-10-09T00:00:00", "descriptions": [ { "lang": "en", "value": "An Improper Certificate Validation weakness in the SRX Series Application Identification (app-id) signature update client of Juniper Networks Junos OS allows an attacker to perform Man-in-the-Middle (MitM) attacks which may compromise the integrity and confidentiality of the device. This issue affects: Juniper Networks Junos OS 15.1X49 versions prior to 15.1X49-D120 on SRX Series devices. No other versions of Junos OS are affected." } ], "exploits": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295 Improper Certificate Validation", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-300", "description": "CWE-300 Channel Accessible by Non-Endpoint (\u0027Man-in-the-Middle\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-09T19:26:17", "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "shortName": "juniper" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://kb.juniper.net/JSA10952" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-application-identification-overview.html" } ], "solutions": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: 15.1X49-D120, and all subsequent releases." } ], "source": { "advisory": "JSA10952", "defect": [ "1291665" ], "discovery": "INTERNAL" }, "title": "Junos OS: SRX Series: An attacker may be able to perform Man-in-the-Middle (MitM) attacks during app-id signature updates.", "workarounds": [ { "lang": "en", "value": "Set the following command in the device for affected releases:\n\n set services application-identification download secure-download" } ], "x_generator": { "engine": "Vulnogram 0.0.6" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "sirt@juniper.net", "DATE_PUBLIC": "2019-10-09T16:00:00.000Z", "ID": "CVE-2019-0054", "STATE": "PUBLIC", "TITLE": "Junos OS: SRX Series: An attacker may be able to perform Man-in-the-Middle (MitM) attacks during app-id signature updates." }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Junos OS", "version": { "version_data": [ { "platform": "SRX Series", "version_affected": "\u003c", "version_name": "15.1X49", "version_value": "15.1X49-D120" } ] } } ] }, "vendor_name": "Juniper Networks" } ] } }, "configuration": [ { "lang": "en", "value": "The following minimum configuration is required:\n services application-identification" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An Improper Certificate Validation weakness in the SRX Series Application Identification (app-id) signature update client of Juniper Networks Junos OS allows an attacker to perform Man-in-the-Middle (MitM) attacks which may compromise the integrity and confidentiality of the device. This issue affects: Juniper Networks Junos OS 15.1X49 versions prior to 15.1X49-D120 on SRX Series devices. No other versions of Junos OS are affected." } ] }, "exploit": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "generator": { "engine": "Vulnogram 0.0.6" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-295 Improper Certificate Validation" } ] }, { "description": [ { "lang": "eng", "value": "CWE-300 Channel Accessible by Non-Endpoint (\u0027Man-in-the-Middle\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.juniper.net/JSA10952", "refsource": "MISC", "url": "https://kb.juniper.net/JSA10952" }, { "name": "https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-application-identification-overview.html", "refsource": "MISC", "url": "https://www.juniper.net/documentation/en_US/junos/topics/topic-map/security-application-identification-overview.html" } ] }, "solution": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: 15.1X49-D120, and all subsequent releases." } ], "source": { "advisory": "JSA10952", "defect": [ "1291665" ], "discovery": "INTERNAL" }, "work_around": [ { "lang": "en", "value": "Set the following command in the device for affected releases:\n\n set services application-identification download secure-download" } ] } } }, "cveMetadata": { "assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "assignerShortName": "juniper", "cveId": "CVE-2019-0054", "datePublished": "2019-10-09T19:26:17.333372Z", "dateReserved": "2018-10-11T00:00:00", "dateUpdated": "2024-09-17T00:36:21.418Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-0060 (GCVE-0-2019-0060)
Vulnerability from cvelistv5
Published
2019-10-09 19:26
Modified
2024-09-16 20:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial of Service
- CWE-755 - Improper Handling of Exceptional Conditions
Summary
The flowd process, responsible for forwarding traffic in SRX Series services gateways, may crash and restart when processing specific transit IP packets through an IPSec tunnel. Continued processing of these packets may result in an extended Denial of Service (DoS) condition. This issue only occurs when IPSec tunnels are configured. Systems without IPSec tunnel configurations are not vulnerable to this issue. This issue affects Juniper Networks Junos OS: 15.1X49 versions prior to 15.1X49-D171, 15.1X49-D180 on SRX Series; 18.2 versions 18.2R2-S1 and later, prior to 18.2R3 on SRX Series; 18.4 versions prior to 18.4R2 on SRX Series.
References
URL | Tags | |||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Juniper Networks | Junos OS |
Version: 15.1X49 < 15.1X49-D171, 15.1X49-D180 Version: 18.2R2-S1 < 18.2* Version: 18.4 < 18.4R2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:37:07.171Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.juniper.net/JSA10959" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.juniper.net/documentation/en_US/junos/topics/topic-map/ipsec-tunnel-traffic-configuration.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "SRX Series" ], "product": "Junos OS", "vendor": "Juniper Networks", "versions": [ { "lessThan": "15.1X49-D171, 15.1X49-D180", "status": "affected", "version": "15.1X49", "versionType": "custom" }, { "changes": [ { "at": "18.2R3", "status": "unaffected" } ], "lessThan": "18.2*", "status": "affected", "version": "18.2R2-S1", "versionType": "custom" }, { "lessThan": "18.4R2", "status": "affected", "version": "18.4", "versionType": "custom" } ] } ], "configurations": [ { "lang": "en", "value": "The following example shows a sample IPSec tunnel configuration:\n\n [edit security ipsec]\n security-association manual-sa1 {\n ...\n }\n\n [edit interfaces es-0/1/0]\n ...\n family inet {\n ipsec-sa manual-sa1;" } ], "datePublic": "2019-10-09T00:00:00", "descriptions": [ { "lang": "en", "value": "The flowd process, responsible for forwarding traffic in SRX Series services gateways, may crash and restart when processing specific transit IP packets through an IPSec tunnel. Continued processing of these packets may result in an extended Denial of Service (DoS) condition. This issue only occurs when IPSec tunnels are configured. Systems without IPSec tunnel configurations are not vulnerable to this issue. This issue affects Juniper Networks Junos OS: 15.1X49 versions prior to 15.1X49-D171, 15.1X49-D180 on SRX Series; 18.2 versions 18.2R2-S1 and later, prior to 18.2R3 on SRX Series; 18.4 versions prior to 18.4R2 on SRX Series." } ], "exploits": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] }, { "descriptions": [ { "cweId": "CWE-755", "description": "CWE-755 Improper Handling of Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-09T19:26:17", "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "shortName": "juniper" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://kb.juniper.net/JSA10959" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.juniper.net/documentation/en_US/junos/topics/topic-map/ipsec-tunnel-traffic-configuration.html" } ], "solutions": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: 15.1X49-D171, 15.1X49-D180, 18.2R3, 18.4R2, 19.1R1, and all subsequent releases." } ], "source": { "advisory": "JSA10959", "defect": [ "1409277" ], "discovery": "USER" }, "title": "Junos OS: SRX Series: flowd process crash due to processing of specific transit IP packets", "workarounds": [ { "lang": "en", "value": "There are no viable workarounds for this issue." } ], "x_generator": { "engine": "Vulnogram 0.0.8" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "sirt@juniper.net", "DATE_PUBLIC": "2019-10-09T16:00:00.000Z", "ID": "CVE-2019-0060", "STATE": "PUBLIC", "TITLE": "Junos OS: SRX Series: flowd process crash due to processing of specific transit IP packets" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Junos OS", "version": { "version_data": [ { "platform": "SRX Series", "version_affected": "\u003c", "version_name": "15.1X49", "version_value": "15.1X49-D171, 15.1X49-D180" }, { "platform": "SRX Series", "version_affected": "\u003e=", "version_name": "18.2", "version_value": "18.2R2-S1" }, { "platform": "SRX Series", "version_affected": "\u003c", "version_name": "18.2", "version_value": "18.2R3" }, { "platform": "SRX Series", "version_affected": "\u003c", "version_name": "18.4", "version_value": "18.4R2" } ] } } ] }, "vendor_name": "Juniper Networks" } ] } }, "configuration": [ { "lang": "en", "value": "The following example shows a sample IPSec tunnel configuration:\n\n [edit security ipsec]\n security-association manual-sa1 {\n ...\n }\n\n [edit interfaces es-0/1/0]\n ...\n family inet {\n ipsec-sa manual-sa1;" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The flowd process, responsible for forwarding traffic in SRX Series services gateways, may crash and restart when processing specific transit IP packets through an IPSec tunnel. Continued processing of these packets may result in an extended Denial of Service (DoS) condition. This issue only occurs when IPSec tunnels are configured. Systems without IPSec tunnel configurations are not vulnerable to this issue. This issue affects Juniper Networks Junos OS: 15.1X49 versions prior to 15.1X49-D171, 15.1X49-D180 on SRX Series; 18.2 versions 18.2R2-S1 and later, prior to 18.2R3 on SRX Series; 18.4 versions prior to 18.4R2 on SRX Series." } ] }, "exploit": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "generator": { "engine": "Vulnogram 0.0.8" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] }, { "description": [ { "lang": "eng", "value": "CWE-755 Improper Handling of Exceptional Conditions" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.juniper.net/JSA10959", "refsource": "MISC", "url": "https://kb.juniper.net/JSA10959" }, { "name": "https://www.juniper.net/documentation/en_US/junos/topics/topic-map/ipsec-tunnel-traffic-configuration.html", "refsource": "MISC", "url": "https://www.juniper.net/documentation/en_US/junos/topics/topic-map/ipsec-tunnel-traffic-configuration.html" } ] }, "solution": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: 15.1X49-D171, 15.1X49-D180, 18.2R3, 18.4R2, 19.1R1, and all subsequent releases." } ], "source": { "advisory": "JSA10959", "defect": [ "1409277" ], "discovery": "USER" }, "work_around": [ { "lang": "en", "value": "There are no viable workarounds for this issue." } ] } } }, "cveMetadata": { "assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "assignerShortName": "juniper", "cveId": "CVE-2019-0060", "datePublished": "2019-10-09T19:26:17.576660Z", "dateReserved": "2018-10-11T00:00:00", "dateUpdated": "2024-09-16T20:51:54.618Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-0059 (GCVE-0-2019-0059)
Vulnerability from cvelistv5
Published
2019-10-09 19:26
Modified
2024-09-17 02:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-400 - Uncontrolled Resource Consumption (3.2)
Summary
A memory leak vulnerability in the of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) to the device by sending specific commands from a peered BGP host and having those BGP states delivered to the vulnerable device. This issue affects: Juniper Networks Junos OS: 18.1 versions prior to 18.1R2-S4, 18.1R3-S1; 18.1X75 all versions. Versions before 18.1R1 are not affected.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Juniper Networks | Junos OS |
Version: 18.1X75 all versions Version: 18.1 < 18.1R2-S4, 18.1R3-S1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:37:07.215Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.juniper.net/JSA10957" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Junos OS", "vendor": "Juniper Networks", "versions": [ { "status": "affected", "version": "18.1X75 all versions" }, { "status": "unaffected", "version": "18.2X75-D5" }, { "lessThan": "18.1R2-S4, 18.1R3-S1", "status": "affected", "version": "18.1", "versionType": "custom" } ] } ], "configurations": [ { "lang": "en", "value": "The minimal configuration required is for BGP to be enabled on the device." } ], "datePublic": "2019-10-09T00:00:00", "descriptions": [ { "lang": "en", "value": "A memory leak vulnerability in the of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) to the device by sending specific commands from a peered BGP host and having those BGP states delivered to the vulnerable device. This issue affects: Juniper Networks Junos OS: 18.1 versions prior to 18.1R2-S4, 18.1R3-S1; 18.1X75 all versions. Versions before 18.1R1 are not affected." } ], "exploits": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption (3.2)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-09T19:26:17", "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "shortName": "juniper" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://kb.juniper.net/JSA10957" } ], "solutions": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: 18.1R2-S4, 18.1R3-S1, 18.2X75-D5, 18.2R1, and all subsequent releases." } ], "source": { "advisory": "JSA10957", "defect": [ "1356763" ], "discovery": "INTERNAL" }, "title": "Junos OS: The routing protocol process (rpd) may crash and generate core files upon receipt of specific valid BGP states from a peered host.", "workarounds": [ { "lang": "en", "value": "There are no viable workarounds for this issue." } ], "x_generator": { "engine": "Vulnogram 0.0.6" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "sirt@juniper.net", "DATE_PUBLIC": "2019-10-09T16:00:00.000Z", "ID": "CVE-2019-0059", "STATE": "PUBLIC", "TITLE": "Junos OS: The routing protocol process (rpd) may crash and generate core files upon receipt of specific valid BGP states from a peered host." }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Junos OS", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "18.1", "version_value": "18.1R2-S4, 18.1R3-S1" }, { "version_affected": "=", "version_name": "18.1X75", "version_value": "all versions" }, { "version_affected": "!", "version_name": "18.2X75", "version_value": "18.2X75-D5" } ] } } ] }, "vendor_name": "Juniper Networks" } ] } }, "configuration": [ { "lang": "en", "value": "The minimal configuration required is for BGP to be enabled on the device." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A memory leak vulnerability in the of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) to the device by sending specific commands from a peered BGP host and having those BGP states delivered to the vulnerable device. This issue affects: Juniper Networks Junos OS: 18.1 versions prior to 18.1R2-S4, 18.1R3-S1; 18.1X75 all versions. Versions before 18.1R1 are not affected." } ] }, "exploit": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "generator": { "engine": "Vulnogram 0.0.6" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400: Uncontrolled Resource Consumption (3.2)" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.juniper.net/JSA10957", "refsource": "MISC", "url": "https://kb.juniper.net/JSA10957" } ] }, "solution": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: 18.1R2-S4, 18.1R3-S1, 18.2X75-D5, 18.2R1, and all subsequent releases." } ], "source": { "advisory": "JSA10957", "defect": [ "1356763" ], "discovery": "INTERNAL" }, "work_around": [ { "lang": "en", "value": "There are no viable workarounds for this issue." } ] } } }, "cveMetadata": { "assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "assignerShortName": "juniper", "cveId": "CVE-2019-0059", "datePublished": "2019-10-09T19:26:17.536330Z", "dateReserved": "2018-10-11T00:00:00", "dateUpdated": "2024-09-17T02:27:50.516Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-10012 (GCVE-0-2016-10012)
Vulnerability from cvelistv5
Published
2017-01-05 00:00
Modified
2024-08-06 03:07
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures.
References
URL | Tags | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T03:07:31.930Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20171130-0002/" }, { "name": "[oss-security] 20161219 Announce: OpenSSH 7.4 released", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/12/19/2" }, { "name": "1037490", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037490" }, { "tags": [ "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03818en_us" }, { "tags": [ "x_transferred" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.647637" }, { "name": "RHSA-2017:2029", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2029" }, { "name": "[debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html" }, { "tags": [ "x_transferred" ], "url": "https://www.openssh.com/txt/release-7.4" }, { "name": "94975", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securityfocus.com/bid/94975" }, { "tags": [ "x_transferred" ], "url": "https://github.com/openbsd/src/commit/3095060f479b86288e31c79ecbc5131a66bcd2f9" }, { "tags": [ "x_transferred" ], "url": "https://support.f5.com/csp/article/K62201745?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-12-19T00:00:00", "descriptions": [ { "lang": "en", "value": "The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-13T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://security.netapp.com/advisory/ntap-20171130-0002/" }, { "name": "[oss-security] 20161219 Announce: OpenSSH 7.4 released", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2016/12/19/2" }, { "name": "1037490", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1037490" }, { "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03818en_us" }, { "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.647637" }, { "name": "RHSA-2017:2029", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2029" }, { "name": "[debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html" }, { "url": "https://www.openssh.com/txt/release-7.4" }, { "name": "94975", "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/94975" }, { "url": "https://github.com/openbsd/src/commit/3095060f479b86288e31c79ecbc5131a66bcd2f9" }, { "url": "https://support.f5.com/csp/article/K62201745?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-10012", "datePublished": "2017-01-05T00:00:00", "dateReserved": "2016-12-19T00:00:00", "dateUpdated": "2024-08-06T03:07:31.930Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-10010 (GCVE-0-2016-10010)
Vulnerability from cvelistv5
Published
2017-01-05 00:00
Modified
2024-08-06 03:07
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c.
References
URL | Tags | ||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T03:07:32.015Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "94972", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securityfocus.com/bid/94972" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20171130-0002/" }, { "name": "[oss-security] 20161219 Announce: OpenSSH 7.4 released", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/12/19/2" }, { "name": "1037490", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037490" }, { "tags": [ "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03818en_us" }, { "name": "FreeBSD-SA-17:01", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:01.openssh.asc" }, { "tags": [ "x_transferred" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.647637" }, { "tags": [ "x_transferred" ], "url": "https://github.com/openbsd/src/commit/c76fac666ea038753294f2ac94d310f8adece9ce" }, { "name": "40962", "tags": [ "exploit", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/40962/" }, { "tags": [ "x_transferred" ], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1010" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/140262/OpenSSH-Local-Privilege-Escalation.html" }, { "tags": [ "x_transferred" ], "url": "https://www.openssh.com/txt/release-7.4" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-12-19T00:00:00", "descriptions": [ { "lang": "en", "value": "sshd in OpenSSH before 7.4, when privilege separation is not used, creates forwarded Unix-domain sockets as root, which might allow local users to gain privileges via unspecified vectors, related to serverloop.c." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-13T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "94972", "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/94972" }, { "url": "https://security.netapp.com/advisory/ntap-20171130-0002/" }, { "name": "[oss-security] 20161219 Announce: OpenSSH 7.4 released", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2016/12/19/2" }, { "name": "1037490", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1037490" }, { "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03818en_us" }, { "name": "FreeBSD-SA-17:01", "tags": [ "vendor-advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:01.openssh.asc" }, { "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.647637" }, { "url": "https://github.com/openbsd/src/commit/c76fac666ea038753294f2ac94d310f8adece9ce" }, { "name": "40962", "tags": [ "exploit" ], "url": "https://www.exploit-db.com/exploits/40962/" }, { "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1010" }, { "url": "http://packetstormsecurity.com/files/140262/OpenSSH-Local-Privilege-Escalation.html" }, { "url": "https://www.openssh.com/txt/release-7.4" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-10010", "datePublished": "2017-01-05T00:00:00", "dateReserved": "2016-12-19T00:00:00", "dateUpdated": "2024-08-06T03:07:32.015Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-0057 (GCVE-0-2019-0057)
Vulnerability from cvelistv5
Published
2019-10-09 19:26
Modified
2024-09-17 00:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE 285 Improper Authorization
Summary
An improper authorization weakness in Juniper Networks Junos OS allows a local authenticated attacker to bypass regular security controls to access the Junos Device Manager (JDM) application and take control of the system. This issue affects: Juniper Networks Junos OS versions prior to 18.2R1, 18.2X75-D5.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Juniper Networks | Junos OS |
Version: unspecified < 18.2R1, 18.2X75-D5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:37:07.518Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.juniper.net/JSA10955" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "NFX Series" ], "product": "Junos OS", "vendor": "Juniper Networks", "versions": [ { "lessThan": "18.2R1, 18.2X75-D5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2019-10-09T00:00:00", "descriptions": [ { "lang": "en", "value": "An improper authorization weakness in Juniper Networks Junos OS allows a local authenticated attacker to bypass regular security controls to access the Junos Device Manager (JDM) application and take control of the system. This issue affects: Juniper Networks Junos OS versions prior to 18.2R1, 18.2X75-D5." } ], "exploits": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE 285 Improper Authorization", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-09T19:26:17", "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "shortName": "juniper" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://kb.juniper.net/JSA10955" } ], "solutions": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: 18.2R1, 18.2X75-D5, and all subsequent releases." } ], "source": { "advisory": "JSA10955", "defect": [ "1341370" ], "discovery": "INTERNAL" }, "title": "NFX Series: An attacker may be able to take control of the JDM application and subsequently the entire system.", "workarounds": [ { "lang": "en", "value": "There are no viable workarounds for this issue." } ], "x_generator": { "engine": "Vulnogram 0.0.6" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "sirt@juniper.net", "DATE_PUBLIC": "2019-10-09T16:00:00.000Z", "ID": "CVE-2019-0057", "STATE": "PUBLIC", "TITLE": "NFX Series: An attacker may be able to take control of the JDM application and subsequently the entire system." }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Junos OS", "version": { "version_data": [ { "platform": "NFX Series", "version_affected": "\u003c", "version_value": "18.2R1, 18.2X75-D5" } ] } } ] }, "vendor_name": "Juniper Networks" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper authorization weakness in Juniper Networks Junos OS allows a local authenticated attacker to bypass regular security controls to access the Junos Device Manager (JDM) application and take control of the system. This issue affects: Juniper Networks Junos OS versions prior to 18.2R1, 18.2X75-D5." } ] }, "exploit": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "generator": { "engine": "Vulnogram 0.0.6" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE 285 Improper Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.juniper.net/JSA10955", "refsource": "MISC", "url": "https://kb.juniper.net/JSA10955" } ] }, "solution": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: 18.2R1, 18.2X75-D5, and all subsequent releases." } ], "source": { "advisory": "JSA10955", "defect": [ "1341370" ], "discovery": "INTERNAL" }, "work_around": [ { "lang": "en", "value": "There are no viable workarounds for this issue." } ] } } }, "cveMetadata": { "assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "assignerShortName": "juniper", "cveId": "CVE-2019-0057", "datePublished": "2019-10-09T19:26:17.458102Z", "dateReserved": "2018-10-11T00:00:00", "dateUpdated": "2024-09-17T00:25:27.294Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2015-8325 (GCVE-0-2015-8325)
Vulnerability from cvelistv5
Published
2016-05-01 00:00
Modified
2024-08-06 08:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PRELOAD environment variable.
References
URL | Tags | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:13:32.458Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "86187", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securityfocus.com/bid/86187" }, { "name": "DSA-3550", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3550" }, { "tags": [ "x_transferred" ], "url": "https://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-8325.html" }, { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328012" }, { "name": "RHSA-2017:0641", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0641.html" }, { "name": "RHSA-2016:2588", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2588.html" }, { "name": "1036487", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036487" }, { "tags": [ "x_transferred" ], "url": "https://anongit.mindrot.org/openssh.git/commit/?id=85bdcd7c92fe7ff133bbc4e10a65c91810f88755" }, { "tags": [ "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2015-8325" }, { "name": "GLSA-201612-18", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201612-18" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180628-0001/" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-04-13T00:00:00", "descriptions": [ { "lang": "en", "value": "The do_setup_env function in session.c in sshd in OpenSSH through 7.2p2, when the UseLogin feature is enabled and PAM is configured to read .pam_environment files in user home directories, allows local users to gain privileges by triggering a crafted environment for the /bin/login program, as demonstrated by an LD_PRELOAD environment variable." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-13T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "86187", "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/86187" }, { "name": "DSA-3550", "tags": [ "vendor-advisory" ], "url": "http://www.debian.org/security/2016/dsa-3550" }, { "url": "https://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-8325.html" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1328012" }, { "name": "RHSA-2017:0641", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0641.html" }, { "name": "RHSA-2016:2588", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2588.html" }, { "name": "1036487", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1036487" }, { "url": "https://anongit.mindrot.org/openssh.git/commit/?id=85bdcd7c92fe7ff133bbc4e10a65c91810f88755" }, { "url": "https://security-tracker.debian.org/tracker/CVE-2015-8325" }, { "name": "GLSA-201612-18", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/201612-18" }, { "url": "https://security.netapp.com/advisory/ntap-20180628-0001/" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8325", "datePublished": "2016-05-01T00:00:00", "dateReserved": "2015-11-24T00:00:00", "dateUpdated": "2024-08-06T08:13:32.458Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-0061 (GCVE-0-2019-0061)
Vulnerability from cvelistv5
Published
2019-10-09 19:26
Modified
2024-09-17 03:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-657 - Violation of Secure Design Principles
Summary
The management daemon (MGD) is responsible for all configuration and management operations in Junos OS. The Junos CLI communicates with MGD over an internal unix-domain socket and is granted special permission to open this protected mode socket. Due to a misconfiguration of the internal socket, a local, authenticated user may be able to exploit this vulnerability to gain administrative privileges. This issue only affects Linux-based platforms. FreeBSD-based platforms are unaffected by this vulnerability. Exploitation of this vulnerability requires Junos shell access. This issue cannot be exploited from the Junos CLI. This issue affects Juniper Networks Junos OS: 15.1X49 versions prior to 15.1X49-D171, 15.1X49-D180; 15.1X53 versions prior to 15.1X53-D496, 15.1X53-D69; 16.1 versions prior to 16.1R7-S4; 16.2 versions prior to 16.2R2-S9; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R1-S8, 17.2R2-S7, 17.2R3-S1; 17.3 versions prior to 17.3R3-S4; 17.4 versions prior to 17.4R1-S6, 17.4R1-S7, 17.4R2-S3, 17.4R3; 18.1 versions prior to 18.1R2-S4, 18.1R3-S4; 18.2 versions prior to 18.2R1-S5, 18.2R2-S2, 18.2R3; 18.3 versions prior to 18.3R1-S3, 18.3R2; 18.4 versions prior to 18.4R1-S2, 18.4R2.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Juniper Networks | Junos OS |
Version: 15.1X49 < 15.1X49-D171, 15.1X49-D180 Version: 15.1X53 < 15.1X53-D496, 15.1X53-D69 Version: 16.1 < 16.1R7-S4 Version: 16.2 < 16.2R2-S9 Version: 17.1 < 17.1R3 Version: 17.2 < 17.2R1-S8, 17.2R2-S7, 17.2R3-S1 Version: 17.3 < 17.3R3-S4 Version: 17.4 < 17.4R1-S6, 17.4R1-S7, 17.4R2-S3, 17.4R3 Version: 18.1 < 18.1R2-S4, 18.1R3-S4 Version: 18.2 < 18.2R1-S5, 18.2R2-S2, 18.2R3 Version: 18.3 < 18.3R1-S3, 18.3R2 Version: 18.4 < 18.4R1-S2, 18.4R2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:37:07.214Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://kb.juniper.net/JSA10960" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Junos OS", "vendor": "Juniper Networks", "versions": [ { "lessThan": "15.1X49-D171, 15.1X49-D180", "status": "affected", "version": "15.1X49", "versionType": "custom" }, { "lessThan": "15.1X53-D496, 15.1X53-D69", "status": "affected", "version": "15.1X53", "versionType": "custom" }, { "lessThan": "16.1R7-S4", "status": "affected", "version": "16.1", "versionType": "custom" }, { "lessThan": "16.2R2-S9", "status": "affected", "version": "16.2", "versionType": "custom" }, { "lessThan": "17.1R3", "status": "affected", "version": "17.1", "versionType": "custom" }, { "lessThan": "17.2R1-S8, 17.2R2-S7, 17.2R3-S1", "status": "affected", "version": "17.2", "versionType": "custom" }, { "lessThan": "17.3R3-S4", "status": "affected", "version": "17.3", "versionType": "custom" }, { "lessThan": "17.4R1-S6, 17.4R1-S7, 17.4R2-S3, 17.4R3", "status": "affected", "version": "17.4", "versionType": "custom" }, { "lessThan": "18.1R2-S4, 18.1R3-S4", "status": "affected", "version": "18.1", "versionType": "custom" }, { "lessThan": "18.2R1-S5, 18.2R2-S2, 18.2R3", "status": "affected", "version": "18.2", "versionType": "custom" }, { "lessThan": "18.3R1-S3, 18.3R2", "status": "affected", "version": "18.3", "versionType": "custom" }, { "lessThan": "18.4R1-S2, 18.4R2", "status": "affected", "version": "18.4", "versionType": "custom" } ] } ], "datePublic": "2019-10-09T00:00:00", "descriptions": [ { "lang": "en", "value": "The management daemon (MGD) is responsible for all configuration and management operations in Junos OS. The Junos CLI communicates with MGD over an internal unix-domain socket and is granted special permission to open this protected mode socket. Due to a misconfiguration of the internal socket, a local, authenticated user may be able to exploit this vulnerability to gain administrative privileges. This issue only affects Linux-based platforms. FreeBSD-based platforms are unaffected by this vulnerability. Exploitation of this vulnerability requires Junos shell access. This issue cannot be exploited from the Junos CLI. This issue affects Juniper Networks Junos OS: 15.1X49 versions prior to 15.1X49-D171, 15.1X49-D180; 15.1X53 versions prior to 15.1X53-D496, 15.1X53-D69; 16.1 versions prior to 16.1R7-S4; 16.2 versions prior to 16.2R2-S9; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R1-S8, 17.2R2-S7, 17.2R3-S1; 17.3 versions prior to 17.3R3-S4; 17.4 versions prior to 17.4R1-S6, 17.4R1-S7, 17.4R2-S3, 17.4R3; 18.1 versions prior to 18.1R2-S4, 18.1R3-S4; 18.2 versions prior to 18.2R1-S5, 18.2R2-S2, 18.2R3; 18.3 versions prior to 18.3R1-S3, 18.3R2; 18.4 versions prior to 18.4R1-S2, 18.4R2." } ], "exploits": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-657", "description": "CWE-657 Violation of Secure Design Principles", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-09T19:26:17", "orgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "shortName": "juniper" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://kb.juniper.net/JSA10960" } ], "solutions": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: 15.1X49-D171, 15.1X49-D180, 15.1X53-D496, 15.1X53-D69, 16.1R7-S4, 16.2R2-S9, 17.1R3, 17.2R1-S8, 17.2R2-S7, 17.2R3-S1, 17.3R3-S4, 17.4R1-S6, 17.4R1-S7, 17.4R2-S3, 17.4R3, 18.1R2-S4, 18.1R3-S4, 18.2R1-S5, 18.2R2-S2, 18.2R3, 18.3R1-S3, 18.3R2, 18.4R1-S2, 18.4R2, 19.1R1, and all subsequent releases." } ], "source": { "advisory": "JSA10960", "defect": [ "1406219" ], "discovery": "INTERNAL" }, "title": "Junos OS: Insecure management daemon (MGD) configuration may allow local privilege escalation", "workarounds": [ { "lang": "en", "value": "Limit access to the Junos shell to only trusted administrators." } ], "x_generator": { "engine": "Vulnogram 0.0.8" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "sirt@juniper.net", "DATE_PUBLIC": "2019-10-09T16:00:00.000Z", "ID": "CVE-2019-0061", "STATE": "PUBLIC", "TITLE": "Junos OS: Insecure management daemon (MGD) configuration may allow local privilege escalation" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Junos OS", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "15.1X49", "version_value": "15.1X49-D171, 15.1X49-D180" }, { "version_affected": "\u003c", "version_name": "15.1X53", "version_value": "15.1X53-D496, 15.1X53-D69" }, { "version_affected": "\u003c", "version_name": "16.1", "version_value": "16.1R7-S4" }, { "version_affected": "\u003c", "version_name": "16.2", "version_value": "16.2R2-S9" }, { "version_affected": "\u003c", "version_name": "17.1", "version_value": "17.1R3" }, { "version_affected": "\u003c", "version_name": "17.2", "version_value": "17.2R1-S8, 17.2R2-S7, 17.2R3-S1" }, { "version_affected": "\u003c", "version_name": "17.3", "version_value": "17.3R3-S4" }, { "version_affected": "\u003c", "version_name": "17.4", "version_value": "17.4R1-S6, 17.4R1-S7, 17.4R2-S3, 17.4R3" }, { "version_affected": "\u003c", "version_name": "18.1", "version_value": "18.1R2-S4, 18.1R3-S4" }, { "version_affected": "\u003c", "version_name": "18.2", "version_value": "18.2R1-S5, 18.2R2-S2, 18.2R3" }, { "version_affected": "\u003c", "version_name": "18.3", "version_value": "18.3R1-S3, 18.3R2" }, { "version_affected": "\u003c", "version_name": "18.4", "version_value": "18.4R1-S2, 18.4R2" } ] } } ] }, "vendor_name": "Juniper Networks" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The management daemon (MGD) is responsible for all configuration and management operations in Junos OS. The Junos CLI communicates with MGD over an internal unix-domain socket and is granted special permission to open this protected mode socket. Due to a misconfiguration of the internal socket, a local, authenticated user may be able to exploit this vulnerability to gain administrative privileges. This issue only affects Linux-based platforms. FreeBSD-based platforms are unaffected by this vulnerability. Exploitation of this vulnerability requires Junos shell access. This issue cannot be exploited from the Junos CLI. This issue affects Juniper Networks Junos OS: 15.1X49 versions prior to 15.1X49-D171, 15.1X49-D180; 15.1X53 versions prior to 15.1X53-D496, 15.1X53-D69; 16.1 versions prior to 16.1R7-S4; 16.2 versions prior to 16.2R2-S9; 17.1 versions prior to 17.1R3; 17.2 versions prior to 17.2R1-S8, 17.2R2-S7, 17.2R3-S1; 17.3 versions prior to 17.3R3-S4; 17.4 versions prior to 17.4R1-S6, 17.4R1-S7, 17.4R2-S3, 17.4R3; 18.1 versions prior to 18.1R2-S4, 18.1R3-S4; 18.2 versions prior to 18.2R1-S5, 18.2R2-S2, 18.2R3; 18.3 versions prior to 18.3R1-S3, 18.3R2; 18.4 versions prior to 18.4R1-S2, 18.4R2." } ] }, "exploit": [ { "lang": "en", "value": "Juniper SIRT is not aware of any malicious exploitation of this vulnerability." } ], "generator": { "engine": "Vulnogram 0.0.8" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-657 Violation of Secure Design Principles" } ] } ] }, "references": { "reference_data": [ { "name": "https://kb.juniper.net/JSA10960", "refsource": "MISC", "url": "https://kb.juniper.net/JSA10960" } ] }, "solution": [ { "lang": "en", "value": "The following software releases have been updated to resolve this specific issue: 15.1X49-D171, 15.1X49-D180, 15.1X53-D496, 15.1X53-D69, 16.1R7-S4, 16.2R2-S9, 17.1R3, 17.2R1-S8, 17.2R2-S7, 17.2R3-S1, 17.3R3-S4, 17.4R1-S6, 17.4R1-S7, 17.4R2-S3, 17.4R3, 18.1R2-S4, 18.1R3-S4, 18.2R1-S5, 18.2R2-S2, 18.2R3, 18.3R1-S3, 18.3R2, 18.4R1-S2, 18.4R2, 19.1R1, and all subsequent releases." } ], "source": { "advisory": "JSA10960", "defect": [ "1406219" ], "discovery": "INTERNAL" }, "work_around": [ { "lang": "en", "value": "Limit access to the Junos shell to only trusted administrators." } ] } } }, "cveMetadata": { "assignerOrgId": "8cbe9d5a-a066-4c94-8978-4b15efeae968", "assignerShortName": "juniper", "cveId": "CVE-2019-0061", "datePublished": "2019-10-09T19:26:17.617796Z", "dateReserved": "2018-10-11T00:00:00", "dateUpdated": "2024-09-17T03:13:39.961Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-10009 (GCVE-0-2016-10009)
Vulnerability from cvelistv5
Published
2017-01-05 00:00
Modified
2025-02-13 16:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket.
References
URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T03:07:31.395Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/openbsd/src/commit/9476ce1dd37d3c3218d5640b74c34c65e5f4efe5" }, { "name": "40963", "tags": [ "exploit", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/40963/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20171130-0002/" }, { "name": "94968", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securityfocus.com/bid/94968" }, { "name": "[oss-security] 20161219 Announce: OpenSSH 7.4 released", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/12/19/2" }, { "name": "1037490", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037490" }, { "tags": [ "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03818en_us" }, { "name": "FreeBSD-SA-17:01", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:01.openssh.asc" }, { "name": "USN-3538-1", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://usn.ubuntu.com/3538-1/" }, { "tags": [ "x_transferred" ], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.647637" }, { "name": "RHSA-2017:2029", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:2029" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/140261/OpenSSH-Arbitrary-Library-Loading.html" }, { "name": "[debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html" }, { "tags": [ "x_transferred" ], "url": "https://www.openssh.com/txt/release-7.4" }, { "tags": [ "x_transferred" ], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1009" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" }, { "name": "[oss-security] 20230719 CVE-2023-38408: Remote Code Execution in OpenSSH\u0027s forwarded ssh-agent", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2023/07/19/9" }, { "name": "20230719 CVE-2023-38408: Remote Code Execution in OpenSSH\u0027s forwarded ssh-agent", "tags": [ "mailing-list", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2023/Jul/31" }, { "name": "[oss-security] 20230719 Re: CVE-2023-38408: Remote Code Execution in OpenSSH\u0027s forwarded ssh-agent", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2023/07/20/1" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-12-19T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Untrusted search path vulnerability in ssh-agent.c in ssh-agent in OpenSSH before 7.4 allows remote attackers to execute arbitrary local PKCS#11 modules by leveraging control over a forwarded agent-socket." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-20T11:06:10.382Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/openbsd/src/commit/9476ce1dd37d3c3218d5640b74c34c65e5f4efe5" }, { "name": "40963", "tags": [ "exploit" ], "url": "https://www.exploit-db.com/exploits/40963/" }, { "url": "https://security.netapp.com/advisory/ntap-20171130-0002/" }, { "name": "94968", "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/94968" }, { "name": "[oss-security] 20161219 Announce: OpenSSH 7.4 released", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2016/12/19/2" }, { "name": "1037490", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1037490" }, { "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03818en_us" }, { "name": "FreeBSD-SA-17:01", "tags": [ "vendor-advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:01.openssh.asc" }, { "name": "USN-3538-1", "tags": [ "vendor-advisory" ], "url": "https://usn.ubuntu.com/3538-1/" }, { "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.647637" }, { "name": "RHSA-2017:2029", "tags": [ "vendor-advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:2029" }, { "url": "http://packetstormsecurity.com/files/140261/OpenSSH-Arbitrary-Library-Loading.html" }, { "name": "[debian-lts-announce] 20180910 [SECURITY] [DLA 1500-1] openssh security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html" }, { "url": "https://www.openssh.com/txt/release-7.4" }, { "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1009" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf" }, { "name": "[oss-security] 20230719 CVE-2023-38408: Remote Code Execution in OpenSSH\u0027s forwarded ssh-agent", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2023/07/19/9" }, { "name": "20230719 CVE-2023-38408: Remote Code Execution in OpenSSH\u0027s forwarded ssh-agent", "tags": [ "mailing-list" ], "url": "http://seclists.org/fulldisclosure/2023/Jul/31" }, { "name": "[oss-security] 20230719 Re: CVE-2023-38408: Remote Code Execution in OpenSSH\u0027s forwarded ssh-agent", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2023/07/20/1" }, { "url": "http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-10009", "datePublished": "2017-01-05T00:00:00.000Z", "dateReserved": "2016-12-19T00:00:00.000Z", "dateUpdated": "2025-02-13T16:27:14.083Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…