Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-39534 (GCVE-0-2021-39534)
Vulnerability from cvelistv5
- n/a
URL | Tags | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:06:42.634Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Juniper/libslax/issues/52" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in libslax through v0.22.1. slaxIsCommentStart() in slaxlexer.c has a heap-based buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-20T15:26:52", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Juniper/libslax/issues/52" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-39534", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in libslax through v0.22.1. slaxIsCommentStart() in slaxlexer.c has a heap-based buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Juniper/libslax/issues/52", "refsource": "MISC", "url": "https://github.com/Juniper/libslax/issues/52" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-39534", "datePublished": "2021-09-20T15:26:52", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:06:42.634Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-39534\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-09-20T16:15:12.347\",\"lastModified\":\"2024-11-21T06:19:37.990\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in libslax through v0.22.1. slaxIsCommentStart() in slaxlexer.c has a heap-based buffer overflow.\"},{\"lang\":\"es\",\"value\":\"Se ha detectado un problema en libslax versiones hasta 0.22.1. La funci\u00f3n slaxIsCommentStart() en el archivo slaxlexer.c presenta un desbordamiento del b\u00fafer en la regi\u00f3n heap de la memoria\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:juniper:libslax:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"0.22.1\",\"matchCriteriaId\":\"6D5523A4-6902-49B4-BD77-FD58DFA71EA1\"}]}]}],\"references\":[{\"url\":\"https://github.com/Juniper/libslax/issues/52\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/Juniper/libslax/issues/52\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]}]}}" } }
gsd-2021-39534
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2021-39534", "description": "An issue was discovered in libslax through v0.22.1. slaxIsCommentStart() in slaxlexer.c has a heap-based buffer overflow.", "id": "GSD-2021-39534" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-39534" ], "details": "An issue was discovered in libslax through v0.22.1. slaxIsCommentStart() in slaxlexer.c has a heap-based buffer overflow.", "id": "GSD-2021-39534", "modified": "2023-12-13T01:23:16.157647Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-39534", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in libslax through v0.22.1. slaxIsCommentStart() in slaxlexer.c has a heap-based buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Juniper/libslax/issues/52", "refsource": "MISC", "url": "https://github.com/Juniper/libslax/issues/52" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:juniper:libslax:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "0.22.1", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-39534" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "An issue was discovered in libslax through v0.22.1. slaxIsCommentStart() in slaxlexer.c has a heap-based buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-787" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Juniper/libslax/issues/52", "refsource": "MISC", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Juniper/libslax/issues/52" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9 } }, "lastModifiedDate": "2021-10-02T02:16Z", "publishedDate": "2021-09-20T16:15Z" } } }
var-202109-0976
Vulnerability from variot
An issue was discovered in libslax through v0.22.1. slaxIsCommentStart() in slaxlexer.c has a heap-based buffer overflow. libslax Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. libslax is an open source implementation of the SLAX language. No detailed vulnerability details are currently available
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202109-0976", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "libslax", "scope": "lte", "trust": 1.0, "vendor": "juniper", "version": "0.22.1" }, { "model": "libslax", "scope": "eq", "trust": 0.8, "vendor": "\u30b8\u30e5\u30cb\u30d1\u30fc\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9", "version": null }, { "model": "libslax", "scope": "eq", "trust": 0.8, "vendor": "\u30b8\u30e5\u30cb\u30d1\u30fc\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u30b9", "version": "0.22.1 to" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-012415" }, { "db": "NVD", "id": "CVE-2021-39534" } ] }, "cve": "CVE-2021-39534", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2021-39534", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-400998", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2021-39534", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39534", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2021-39534", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2021-39534", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202109-1388", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-400998", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-39534", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-400998" }, { "db": "VULMON", "id": "CVE-2021-39534" }, { "db": "JVNDB", "id": "JVNDB-2021-012415" }, { "db": "CNNVD", "id": "CNNVD-202109-1388" }, { "db": "NVD", "id": "CVE-2021-39534" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in libslax through v0.22.1. slaxIsCommentStart() in slaxlexer.c has a heap-based buffer overflow. libslax Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. libslax is an open source implementation of the SLAX language. No detailed vulnerability details are currently available", "sources": [ { "db": "NVD", "id": "CVE-2021-39534" }, { "db": "JVNDB", "id": "JVNDB-2021-012415" }, { "db": "VULHUB", "id": "VHN-400998" }, { "db": "VULMON", "id": "CVE-2021-39534" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39534", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-012415", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-1388", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-19082", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-400998", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39534", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-400998" }, { "db": "VULMON", "id": "CVE-2021-39534" }, { "db": "JVNDB", "id": "JVNDB-2021-012415" }, { "db": "CNNVD", "id": "CNNVD-202109-1388" }, { "db": "NVD", "id": "CVE-2021-39534" } ] }, "id": "VAR-202109-0976", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-400998" } ], "trust": 0.01 }, "last_update_date": "2024-08-14T14:25:14.305000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "13\u00a0#52", "trust": 0.8, "url": "https://github.com/Juniper/libslax/issues/52" }, { "title": "libslax Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=164721" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-012415" }, { "db": "CNNVD", "id": "CNNVD-202109-1388" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-400998" }, { "db": "JVNDB", "id": "JVNDB-2021-012415" }, { "db": "NVD", "id": "CVE-2021-39534" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://github.com/juniper/libslax/issues/52" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39534" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-400998" }, { "db": "VULMON", "id": "CVE-2021-39534" }, { "db": "JVNDB", "id": "JVNDB-2021-012415" }, { "db": "CNNVD", "id": "CNNVD-202109-1388" }, { "db": "NVD", "id": "CVE-2021-39534" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-400998" }, { "db": "VULMON", "id": "CVE-2021-39534" }, { "db": "JVNDB", "id": "JVNDB-2021-012415" }, { "db": "CNNVD", "id": "CNNVD-202109-1388" }, { "db": "NVD", "id": "CVE-2021-39534" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-09-20T00:00:00", "db": "VULHUB", "id": "VHN-400998" }, { "date": "2021-09-20T00:00:00", "db": "VULMON", "id": "CVE-2021-39534" }, { "date": "2022-08-31T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-012415" }, { "date": "2021-09-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-1388" }, { "date": "2021-09-20T16:15:12.347000", "db": "NVD", "id": "CVE-2021-39534" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-02T00:00:00", "db": "VULHUB", "id": "VHN-400998" }, { "date": "2021-10-02T00:00:00", "db": "VULMON", "id": "CVE-2021-39534" }, { "date": "2022-08-31T02:50:00", "db": "JVNDB", "id": "JVNDB-2021-012415" }, { "date": "2021-10-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-1388" }, { "date": "2021-10-02T02:16:16.700000", "db": "NVD", "id": "CVE-2021-39534" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-1388" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "libslax\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-012415" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-1388" } ], "trust": 0.6 } }
ghsa-4wgj-77qr-7qgf
Vulnerability from github
An issue was discovered in libslax through v0.22.1. slaxIsCommentStart() in slaxlexer.c has a heap-based buffer overflow.
{ "affected": [], "aliases": [ "CVE-2021-39534" ], "database_specific": { "cwe_ids": [ "CWE-787" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-09-20T16:15:00Z", "severity": "HIGH" }, "details": "An issue was discovered in libslax through v0.22.1. slaxIsCommentStart() in slaxlexer.c has a heap-based buffer overflow.", "id": "GHSA-4wgj-77qr-7qgf", "modified": "2022-05-24T19:15:09Z", "published": "2022-05-24T19:15:09Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39534" }, { "type": "WEB", "url": "https://github.com/Juniper/libslax/issues/52" } ], "schema_version": "1.4.0", "severity": [] }
CERTFR-2024-AVI-0297
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Juniper. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- Cloud Native Router versions antérieures à 23.4
- cRPD versions antérieures à 23.4R1
- Paragon Active Assurance versions antérieures à 4.2.1
- Paragon Active Assurance versions antérieures à 4.3.0
- Junos OS gamme EX4300 versions antérieures à 20.4R3-S10, 21.2R3-S7 et 21.4R3-S6
- Junos OS gammes QFX5000 Series, EX4400 Series, EX4100 Series et EX4650 Series versions antérieures à 20.4R3-S8, 21.2R3-S6, 21.3R3-S5, 21.4R3-S4, 22.1R3-S3, 22.2R3-S1, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3 et 23.2R1
- Junos OS gammes SRX Branch Series versions antérieures à 21.1R3-S5, 21.2R3-S5, 21.3R3-S4, 21.4R3-S3, 22.1R3-S2, 22.2R2-S2, 22.2R3, 22.3R2-S1, 22.3R3, 22.4R1-S2, 22.4R2 et 23.2R1
- Junos OS gammes MX Series avec SPC3 et MS-MPC versions antérieures à 21.2R3-S6, 21.3R3-S5, 21.4R3-S5, 22.1R3-S3, 22.2R3-S1, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3 et 23.2R1
- Junos OS gamme SRX 5000 Series avec SPC2 versions antérieures à 21.2R3-S7, 21.4, 22.1, 22.2, 22.3, 22.4 et 23.2
- Junos OS gammes MX Series versions antérieures à 20.4R3-S5, 21.1, 21.2R3-S1, 21.3, 21.4R3, 22.1R2, 22.2R2 et 22.3
- Junos OS gamme EX9200-15C versions antérieures à 21.2R3-S1, 21.4R3, 22.1R2 et 22.2R2
- Junos OS gammes SRX4600 versions antérieures à 21.2R3-S7, 21.4R3-S6, 22.1R3-S5, 22.2R3-S3, 22.3R3-S2, 22.4R3, 23.2R1-S2, 23.2R2 et 23.4R1
- Junos OS gammes ACX5448 et ACX710 versions antérieures à 20.4R3-S9, 21.2R3-S5, 21.3R3-S5, 21.4R3-S4, 22.1R3-S2, 22.2R3-S2, 22.3R2-S2, 22.3R3, 22.4R2 et 23.2R1
- Junos OS versions antérieures à 20.4R3-S9, 21.1R3, 21.2R3-S7, 21.3R3-S5, 21.4R3-S5, 22.1R3-S4, 22.2R3-S2, 22.3R3-S2, 22.4R3 et 23.4R2
-
Junos OS Evolved versions antérieures à 20.4R3-S9-EVO, 21.2R3-S7-EVO, 21.3R3-S5-EVO, 21.4R3-S6-EVO, 22.1R3-S4-EVO, 22.2R3-S2-EVO, 22.3R3-S2-EVO, 22.4R3-EVO, 23.2R2-EVO et 23.4R1-EVO
Vendor | Product | Description |
---|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [], "affected_systems_content": "\u003cul\u003e \u003cli\u003eCloud Native Router versions ant\u00e9rieures \u00e0 23.4\u003c/li\u003e \u003cli\u003ecRPD versions ant\u00e9rieures \u00e0 23.4R1\u003c/li\u003e \u003cli\u003eParagon Active Assurance versions ant\u00e9rieures \u00e0 4.2.1\u003c/li\u003e \u003cli\u003eParagon Active Assurance versions ant\u00e9rieures \u00e0 4.3.0\u003c/li\u003e \u003cli\u003eJunos OS gamme EX4300 versions ant\u00e9rieures \u00e0 20.4R3-S10, 21.2R3-S7 et 21.4R3-S6\u003c/li\u003e \u003cli\u003eJunos OS gammes QFX5000 Series, EX4400 Series, EX4100 Series et EX4650 Series versions ant\u00e9rieures \u00e0 20.4R3-S8, 21.2R3-S6, 21.3R3-S5, 21.4R3-S4, 22.1R3-S3, 22.2R3-S1, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3 et 23.2R1\u003c/li\u003e \u003cli\u003eJunos OS gammes SRX Branch Series versions ant\u00e9rieures \u00e0 21.1R3-S5, 21.2R3-S5, 21.3R3-S4, 21.4R3-S3, 22.1R3-S2, 22.2R2-S2, 22.2R3, 22.3R2-S1, 22.3R3, 22.4R1-S2, 22.4R2 et 23.2R1\u003c/li\u003e \u003cli\u003eJunos OS gammes MX Series avec SPC3 et MS-MPC versions ant\u00e9rieures \u00e0 21.2R3-S6, 21.3R3-S5, 21.4R3-S5, 22.1R3-S3, 22.2R3-S1, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3 et 23.2R1\u003c/li\u003e \u003cli\u003eJunos OS gamme SRX 5000 Series avec SPC2 versions ant\u00e9rieures \u00e0 21.2R3-S7, 21.4, 22.1, 22.2, 22.3, 22.4 et 23.2\u003c/li\u003e \u003cli\u003eJunos OS gammes\u00a0MX Series versions ant\u00e9rieures \u00e0 20.4R3-S5, 21.1, 21.2R3-S1, 21.3, 21.4R3, 22.1R2, 22.2R2 et 22.3\u003c/li\u003e \u003cli\u003eJunos OS gamme EX9200-15C versions ant\u00e9rieures \u00e0 21.2R3-S1, 21.4R3, 22.1R2 et 22.2R2\u003c/li\u003e \u003cli\u003eJunos OS gammes\u00a0SRX4600 versions ant\u00e9rieures \u00e0 21.2R3-S7,\u00a021.4R3-S6,\u00a022.1R3-S5,\u00a022.2R3-S3,\u00a022.3R3-S2,\u00a022.4R3,\u00a023.2R1-S2, 23.2R2 et 23.4R1\u003c/li\u003e \u003cli\u003eJunos OS gammes\u00a0ACX5448 et ACX710 versions ant\u00e9rieures \u00e0 20.4R3-S9, 21.2R3-S5, 21.3R3-S5, 21.4R3-S4, 22.1R3-S2, 22.2R3-S2, 22.3R2-S2, 22.3R3, 22.4R2 et 23.2R1\u003c/li\u003e \u003cli\u003eJunos OS versions ant\u00e9rieures \u00e0 20.4R3-S9, 21.1R3, 21.2R3-S7, 21.3R3-S5, 21.4R3-S5, 22.1R3-S4, 22.2R3-S2, 22.3R3-S2, 22.4R3 et 23.4R2\u003c/li\u003e \u003cli\u003e \u003cdiv\u003e \u003cdiv\u003e \u003cp\u003eJunos OS Evolved versions ant\u00e9rieures \u00e0 20.4R3-S9-EVO, 21.2R3-S7-EVO, 21.3R3-S5-EVO, 21.4R3-S6-EVO, 22.1R3-S4-EVO, 22.2R3-S2-EVO, 22.3R3-S2-EVO, 22.4R3-EVO, 23.2R2-EVO et 23.4R1-EVO\u003c/p\u003e \u003c/div\u003e \u003c/div\u003e \u003c/li\u003e \u003c/ul\u003e ", "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-0216", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0216" }, { "name": "CVE-2023-40217", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40217" }, { "name": "CVE-2023-0401", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0401" }, { "name": "CVE-2021-37600", "url": "https://www.cve.org/CVERecord?id=CVE-2021-37600" }, { "name": "CVE-2024-30381", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30381" }, { "name": "CVE-2023-46218", "url": "https://www.cve.org/CVERecord?id=CVE-2023-46218" }, { "name": "CVE-2020-1747", "url": "https://www.cve.org/CVERecord?id=CVE-2020-1747" }, { "name": "CVE-2024-30401", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30401" }, { "name": "CVE-2021-28831", "url": "https://www.cve.org/CVERecord?id=CVE-2021-28831" }, { "name": "CVE-2024-30409", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30409" }, { "name": "CVE-2023-38546", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38546" }, { "name": "CVE-2020-14343", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14343" }, { "name": "CVE-2022-4304", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4304" }, { "name": "CVE-2022-48554", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48554" }, { "name": "CVE-2023-39975", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39975" }, { "name": "CVE-2024-30410", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30410" }, { "name": "CVE-2018-7738", "url": "https://www.cve.org/CVERecord?id=CVE-2018-7738" }, { "name": "CVE-2022-48522", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48522" }, { "name": "CVE-2020-8285", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8285" }, { "name": "CVE-2021-28957", "url": "https://www.cve.org/CVERecord?id=CVE-2021-28957" }, { "name": "CVE-2024-30380", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30380" }, { "name": "CVE-2023-41913", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41913" }, { "name": "CVE-2024-30392", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30392" }, { "name": "CVE-2023-0215", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0215" }, { "name": "CVE-2021-23240", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23240" }, { "name": "CVE-2023-0286", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286" }, { "name": "CVE-2011-1676", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1676" }, { "name": "CVE-2020-8037", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8037" }, { "name": "CVE-2023-4807", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4807" }, { "name": "CVE-2020-19190", "url": "https://www.cve.org/CVERecord?id=CVE-2020-19190" }, { "name": "CVE-2024-30391", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30391" }, { "name": "CVE-2020-8286", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8286" }, { "name": "CVE-2023-2253", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2253" }, { "name": "CVE-2023-44487", "url": "https://www.cve.org/CVERecord?id=CVE-2023-44487" }, { "name": "CVE-2024-30389", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30389" }, { "name": "CVE-2023-29491", "url": "https://www.cve.org/CVERecord?id=CVE-2023-29491" }, { "name": "CVE-2023-3592", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3592" }, { "name": "CVE-2020-19187", "url": "https://www.cve.org/CVERecord?id=CVE-2020-19187" }, { "name": "CVE-2023-0466", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0466" }, { "name": "CVE-2019-9923", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9923" }, { "name": "CVE-2021-39534", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39534" }, { "name": "CVE-2023-5981", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5981" }, { "name": "CVE-2023-27043", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27043" }, { "name": "CVE-2023-0217", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0217" }, { "name": "CVE-2024-30398", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30398" }, { "name": "CVE-2021-22947", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22947" }, { "name": "CVE-2018-1000120", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000120" }, { "name": "CVE-2023-48795", "url": "https://www.cve.org/CVERecord?id=CVE-2023-48795" }, { "name": "CVE-2019-17041", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17041" }, { "name": "CVE-2020-19188", "url": "https://www.cve.org/CVERecord?id=CVE-2020-19188" }, { "name": "CVE-2020-19186", "url": "https://www.cve.org/CVERecord?id=CVE-2020-19186" }, { "name": "CVE-2021-22946", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22946" }, { "name": "CVE-2020-25659", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25659" }, { "name": "CVE-2021-39531", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39531" }, { "name": "CVE-2020-8284", "url": "https://www.cve.org/CVERecord?id=CVE-2020-8284" }, { "name": "CVE-2023-23915", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23915" }, { "name": "CVE-2011-1675", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1675" }, { "name": "CVE-2023-28366", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28366" }, { "name": "CVE-2024-30378", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30378" }, { "name": "CVE-2023-23931", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23931" }, { "name": "CVE-2021-34434", "url": "https://www.cve.org/CVERecord?id=CVE-2021-34434" }, { "name": "CVE-2016-10009", "url": "https://www.cve.org/CVERecord?id=CVE-2016-10009" }, { "name": "CVE-2023-1428", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1428" }, { "name": "CVE-2023-3978", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3978" }, { "name": "CVE-2024-30402", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30402" }, { "name": "CVE-2018-1000215", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000215" }, { "name": "CVE-2023-23914", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23914" }, { "name": "CVE-2019-17042", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17042" }, { "name": "CVE-2024-30403", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30403" }, { "name": "CVE-2021-36159", "url": "https://www.cve.org/CVERecord?id=CVE-2021-36159" }, { "name": "CVE-2018-1000654", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000654" }, { "name": "CVE-2023-5156", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5156" }, { "name": "CVE-2022-2795", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2795" }, { "name": "CVE-2021-30139", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30139" }, { "name": "CVE-2024-30384", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30384" }, { "name": "CVE-2023-2603", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2603" }, { "name": "CVE-2024-30387", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30387" }, { "name": "CVE-2017-18018", "url": "https://www.cve.org/CVERecord?id=CVE-2017-18018" }, { "name": "CVE-2024-30406", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30406" }, { "name": "CVE-2023-43804", "url": "https://www.cve.org/CVERecord?id=CVE-2023-43804" }, { "name": "CVE-2022-4450", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4450" }, { "name": "CVE-2023-32732", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32732" }, { "name": "CVE-2024-30394", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30394" }, { "name": "CVE-2023-2650", "url": "https://www.cve.org/CVERecord?id=CVE-2023-2650" }, { "name": "CVE-2022-3996", "url": "https://www.cve.org/CVERecord?id=CVE-2022-3996" }, { "name": "CVE-2024-30407", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30407" }, { "name": "CVE-2020-36242", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36242" }, { "name": "CVE-2023-4785", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4785" }, { "name": "CVE-2020-22916", "url": "https://www.cve.org/CVERecord?id=CVE-2020-22916" }, { "name": "CVE-2023-38408", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38408" }, { "name": "CVE-2020-27350", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27350" }, { "name": "CVE-2023-36054", "url": "https://www.cve.org/CVERecord?id=CVE-2023-36054" }, { "name": "CVE-2021-39533", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39533" }, { "name": "CVE-2024-30390", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30390" }, { "name": "CVE-2020-19185", "url": "https://www.cve.org/CVERecord?id=CVE-2020-19185" }, { "name": "CVE-2023-0809", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0809" }, { "name": "CVE-2021-20193", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20193" }, { "name": "CVE-2023-4806", "url": "https://www.cve.org/CVERecord?id=CVE-2023-4806" }, { "name": "CVE-2016-2781", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2781" }, { "name": "CVE-2020-19189", "url": "https://www.cve.org/CVERecord?id=CVE-2020-19189" }, { "name": "CVE-2023-32731", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32731" }, { "name": "CVE-2023-49083", "url": "https://www.cve.org/CVERecord?id=CVE-2023-49083" }, { "name": "CVE-2024-30388", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30388" }, { "name": "CVE-2019-18276", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18276" }, { "name": "CVE-2024-30386", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30386" }, { "name": "CVE-2021-33560", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33560" }, { "name": "CVE-2011-1677", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1677" }, { "name": "CVE-2018-20225", "url": "https://www.cve.org/CVERecord?id=CVE-2018-20225" }, { "name": "CVE-2020-28928", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28928" }, { "name": "CVE-2021-41039", "url": "https://www.cve.org/CVERecord?id=CVE-2021-41039" }, { "name": "CVE-2024-30382", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30382" }, { "name": "CVE-2018-20482", "url": "https://www.cve.org/CVERecord?id=CVE-2018-20482" }, { "name": "CVE-2021-40528", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40528" }, { "name": "CVE-2023-32681", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32681" }, { "name": "CVE-2023-3446", "url": "https://www.cve.org/CVERecord?id=CVE-2023-3446" }, { "name": "CVE-2020-28493", "url": "https://www.cve.org/CVERecord?id=CVE-2020-28493" }, { "name": "CVE-2020-27783", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27783" }, { "name": "CVE-2018-1000122", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000122" }, { "name": "CVE-2011-1089", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1089" }, { "name": "CVE-2024-30405", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30405" }, { "name": "CVE-2024-30397", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30397" }, { "name": "CVE-2023-38545", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38545" }, { "name": "CVE-2024-30395", "url": "https://www.cve.org/CVERecord?id=CVE-2024-30395" } ], "initial_release_date": "2024-04-11T00:00:00", "last_revision_date": "2024-04-11T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0297", "revisions": [ { "description": "Version initiale", "revision_date": "2024-04-11T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" }, { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0\ndistance et un d\u00e9ni de service \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79102 du 10 avril 2024", "url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-Evolved-libslax-Multiple-vulnerabilities-in-libslax-resolved?language=en_US" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79106 du 10 avril 2024", "url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Juniper-Cloud-Native-Router-Multiple-vulnerabilities-resolved-in-23-4-release?language=en_US" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79181 du 10 avril 2024", "url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-Evolved-When-MAC-learning-happens-and-an-interface-gets-flapped-the-PFE-crashes-CVE-2024-30403?language=en_US" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79186 du 10 avril 2024", "url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-EX4300-Series-If-a-specific-CLI-command-is-issued-PFE-crashes-will-occur-CVE-2024-30384?language=en_US" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79089 du 10 avril 2024", "url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-QFX5000-Series-and-EX-Series-Specific-malformed-LACP-packets-will-cause-flaps-CVE-2024-30388?language=en_US" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79173 du 10 avril 2024", "url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Paragon-Active-Assurance-probe-serviced-exposes-internal-objects-to-local-users-CVE-2024-30381?language=en_US" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79104 du 10 avril 2024", "url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-Evolved-ACX-Series-with-Paragon-Active-Assurance-Test-Agent-A-local-high-privileged-attacker-can-recover-other-administrators-credentials-CVE-2024-30406?language=en_US" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79094 du 10 avril 2024", "url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-A-specific-EVPN-type-5-route-causes-rpd-crash-CVE-2024-30394?language=en_US" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79183 du 10 avril 2024", "url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-Evolved-Connection-limits-is-not-being-enforced-while-the-resp-rate-limit-is-being-enforced-CVE-2024-30390?language=en_US" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79176 du 10 avril 2024", "url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-SRX4600-Series-A-high-amount-of-specific-traffic-causes-packet-drops-and-an-eventual-PFE-crash-CVE-2024-30398?language=en_US" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79179 du 10 avril 2024", "url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-An-invalid-certificate-causes-a-Denial-of-Service-in-the-Internet-Key-Exchange-IKE-process-CVE-2024-30397?language=en_US" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79187 du 10 avril 2024", "url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-ACX5448-ACX710-Due-to-the-interface-flaps-the-PFE-process-can-crash-CVE-2024-30387?language=en_US" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79109 du 10 avril 2024", "url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-MX-Series-bbe-smgd-process-crash-upon-execution-of-specific-CLI-commands-CVE-2024-30378?language=en_US" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79171 du 10 avril 2024", "url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-l2cpd-crash-upon-receipt-of-a-specific-TLV-CVE-2024-30380?language=en_US" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79188 du 10 avril 2024", "url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-MX-Series-with-SPC3-and-SRX-Series-When-IPsec-authentication-is-configured-with-hmac-sha-384-and-hmac-sha-512-no-authentication-of-traffic-is-performed-CVE-2024-30391?language=en_US" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79099 du 10 avril 2024", "url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Higher-CPU-consumption-on-routing-engine-leads-to-Denial-of-Service-DoS-CVE-2024-30409?language=en_US" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79184 du 10 avril 2024", "url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-EVPN-VXLAN-scenario-state-changes-on-adjacent-systems-can-cause-an-l2ald-process-crash-CVE-2024-30386?language=en_US" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79110 du 10 avril 2024", "url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-MX-Series-and-EX9200-15C-Stack-based-buffer-overflow-in-aftman-CVE-2024-30401?language=en_US" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79174 du 10 avril 2024", "url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Junos-OS-and-Junos-OS-Evolved-RPD-crash-when-CoS-based-forwarding-CBF-policy-is-configured-CVE-2024-30382?language=en_US" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79095 du 10 avril 2024", "url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-malformed-BGP-tunnel-encapsulation-attribute-will-lead-to-an-rpd-crash-CVE-2024-30395?language=en_US" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79100 du 10 avril 2024", "url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-EX4300-Series-Loopback-filter-not-blocking-traffic-despite-having-discard-term-CVE-2024-30410?language=en_US" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79107 du 10 avril 2024", "url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-cRPD-Multiple-vulnerabilities-resolved-in-23-4R1-release?language=en_US" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79092 du 10 avril 2024", "url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-MX-Series-with-SPC3-and-MS-MPC-MIC-When-URL-filtering-is-enabled-and-a-specific-URL-request-is-received-a-flowd-crash-occurs-CVE-2024-30392?language=en_US" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79185 du 10 avril 2024", "url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-EX4300-Series-Firewall-filter-not-blocking-egress-traffic-CVE-2024-30389?language=en_US" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79108 du 10 avril 2024", "url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Multiple-cURL-vulnerabilities-resolved?language=en_US" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79091 du 10 avril 2024", "url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-SRX-Branch-Series-When-DNS-proxy-is-configured-and-specific-DNS-queries-are-received-resolver-s-performance-is-degraded-CVE-2022-2795?language=en_US" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79180 du 10 avril 2024", "url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-The-l2ald-crashes-on-receiving-telemetry-messages-from-a-specific-subscription-CVE-2024-30402?language=en_US" } ] }
fkie_cve-2021-39534
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
cve@mitre.org | https://github.com/Juniper/libslax/issues/52 | Exploit, Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/Juniper/libslax/issues/52 | Exploit, Issue Tracking, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:juniper:libslax:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D5523A4-6902-49B4-BD77-FD58DFA71EA1", "versionEndIncluding": "0.22.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in libslax through v0.22.1. slaxIsCommentStart() in slaxlexer.c has a heap-based buffer overflow." }, { "lang": "es", "value": "Se ha detectado un problema en libslax versiones hasta 0.22.1. La funci\u00f3n slaxIsCommentStart() en el archivo slaxlexer.c presenta un desbordamiento del b\u00fafer en la regi\u00f3n heap de la memoria" } ], "id": "CVE-2021-39534", "lastModified": "2024-11-21T06:19:37.990", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-09-20T16:15:12.347", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Juniper/libslax/issues/52" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Juniper/libslax/issues/52" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cnvd-2022-19082
Vulnerability from cnvd
厂商已发布了漏洞修复程序,请及时关注更新: https://github.com/Juniper/libslax/issues/53
Name | libslax libslax 0.22.1 |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2021-39534", "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2021-39534" } }, "description": "libslax\u662f\u4e00\u6b3eSLAX\u8bed\u8a00\u7684\u5f00\u6e90\u5b9e\u73b0\u3002\n\nlibslax\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8eslaxlexer.c\u4e2d\u7684slaxIsCommentStart()\u6709\u4e00\u4e2a\u57fa\u4e8e\u5806\u7684\u7f13\u51b2\u533a\u6ea2\u51fa\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002", "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://github.com/Juniper/libslax/issues/53", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2022-19082", "openTime": "2022-03-14", "patchDescription": "libslax\u662f\u4e00\u6b3eSLAX\u8bed\u8a00\u7684\u5f00\u6e90\u5b9e\u73b0\u3002\r\n\r\nlibslax\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8eslaxlexer.c\u4e2d\u7684slaxIsCommentStart()\u6709\u4e00\u4e2a\u57fa\u4e8e\u5806\u7684\u7f13\u51b2\u533a\u6ea2\u51fa\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "libslax\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff08CNVD-2022-19082\uff09\u7684\u8865\u4e01", "products": { "product": "libslax libslax 0.22.1" }, "referenceLink": "https://github.com/Juniper/libslax/issues/53", "serverity": "\u4e2d", "submitTime": "2021-09-23", "title": "libslax\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff08CNVD-2022-19082\uff09" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.