fkie_cve-2016-1263
Vulnerability from fkie_nvd
Published
2016-09-09 14:05
Modified
2025-04-12 10:46
Severity ?
Summary
Juniper Junos OS before 12.1X46-D45, 12.1X46-D50, 12.1X47 before 12.1X47-D35, 12.3X48 before 12.3X48-D30, 13.3 before 13.3R9-S1, 14.1 before 14.1R7, 14.2 before 14.2R6, 15.1 before 15.1F2-S5, 15.1F4 before 15.1F4-S2, 15.1R before 15.1R2-S3, 15.1 before 15.1R3, and 15.1X49 before 15.1X49-D40 allow remote attackers to cause a denial of service (kernel crash) via a crafted UDP packet destined to the interface IP address of a 64-bit OS device.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| juniper | junos | * | |
| juniper | junos | 12.1x47 | |
| juniper | junos | 12.1x47 | |
| juniper | junos | 12.1x47 | |
| juniper | junos | 12.1x47 | |
| juniper | junos | 12.1x47 | |
| juniper | junos | 12.1x47 | |
| juniper | junos | 12.3x48 | |
| juniper | junos | 12.3x48 | |
| juniper | junos | 12.3x48 | |
| juniper | junos | 13.3 | |
| juniper | junos | 13.3 | |
| juniper | junos | 13.3 | |
| juniper | junos | 13.3 | |
| juniper | junos | 13.3 | |
| juniper | junos | 13.3 | |
| juniper | junos | 13.3 | |
| juniper | junos | 13.3 | |
| juniper | junos | 13.3 | |
| juniper | junos | 13.3 | |
| juniper | junos | 14.1 | |
| juniper | junos | 14.1 | |
| juniper | junos | 14.1 | |
| juniper | junos | 14.1 | |
| juniper | junos | 14.1 | |
| juniper | junos | 14.1 | |
| juniper | junos | 14.1 | |
| juniper | junos | 14.2 | |
| juniper | junos | 14.2 | |
| juniper | junos | 14.2 | |
| juniper | junos | 14.2 | |
| juniper | junos | 14.2 | |
| juniper | junos | 15.1 | |
| juniper | junos | 15.1 | |
| juniper | junos | 15.1 | |
| juniper | junos | 15.1 | |
| juniper | junos | 15.1 | |
| juniper | junos | 15.1 | |
| juniper | junos | 15.1 | |
| juniper | junos | 15.1 | |
| juniper | junos | 15.1 | |
| juniper | junos | 15.1x49 | |
| juniper | junos | 15.1x49 | |
| juniper | junos | 15.1x49 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:juniper:junos:*:d40:*:*:*:*:*:*",
"matchCriteriaId": "4711A29F-326C-44CF-B079-FFA2E5C0B2C3",
"versionEndIncluding": "12.1x46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:12.1x47:*:*:*:*:*:*:*",
"matchCriteriaId": "0BB3DE56-1B04-4A53-B4A4-93286FC98463",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:12.1x47:d10:*:*:*:*:*:*",
"matchCriteriaId": "181C0D30-4476-48EE-A4A4-3B2461F4AC20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:12.1x47:d15:*:*:*:*:*:*",
"matchCriteriaId": "63F559A2-2744-4771-9420-C70AA87496A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:12.1x47:d20:*:*:*:*:*:*",
"matchCriteriaId": "040A6307-236E-4FAA-9A74-676F1DB0CF17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:12.1x47:d25:*:*:*:*:*:*",
"matchCriteriaId": "350A0F1E-1057-4A8E-AB0B-7615B3877858",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:12.1x47:d30:*:*:*:*:*:*",
"matchCriteriaId": "898DF03B-0E72-4E9A-8C93-926FC01A87DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:12.3x48:d10:*:*:*:*:*:*",
"matchCriteriaId": "4B7066A4-CD05-4E1A-89E8-71B4CB92CFF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:12.3x48:d15:*:*:*:*:*:*",
"matchCriteriaId": "A4AC2E1E-74FB-4DA3-8292-B2079F83FF54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:12.3x48:d25:*:*:*:*:*:*",
"matchCriteriaId": "6E296274-AFC1-4F56-A4B3-827C2E0BC9D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:13.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E4AF5DAA-62F5-491F-A9CE-098970671D43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:13.3:r1:*:*:*:*:*:*",
"matchCriteriaId": "3FF9FF91-9184-4D18-8288-9110E35F4AE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:13.3:r2:*:*:*:*:*:*",
"matchCriteriaId": "0F2E537B-9504-4912-B231-0D83F4459469",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:13.3:r2-s2:*:*:*:*:*:*",
"matchCriteriaId": "99A946CE-FFC7-4F16-82F4-795A6E5B84C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:13.3:r3:*:*:*:*:*:*",
"matchCriteriaId": "4BCB3837-DCBC-4997-B63E-E47957584709",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:13.3:r4:*:*:*:*:*:*",
"matchCriteriaId": "6C88E2B1-469B-442B-9FC0-7C9408CE3917",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:13.3:r5:*:*:*:*:*:*",
"matchCriteriaId": "1FB5A368-E582-4DFD-87B4-C887DA908E47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:13.3:r6:*:*:*:*:*:*",
"matchCriteriaId": "70ED0B93-2CFC-474F-B199-F78E1C67E8C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:13.3:r7:*:*:*:*:*:*",
"matchCriteriaId": "B8D270B6-1681-4EC5-9BC2-1312A50C8E09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:13.3:r8:*:*:*:*:*:*",
"matchCriteriaId": "41DB14FA-0D58-4AE4-9324-310290F1F0F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6237291A-B861-4D53-B7AA-C53A44B76896",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:14.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "9C778627-820A-48F5-9680-0205D6DB5EB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:14.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "FA7F03DC-73A2-4760-B386-2A57E9C97E65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:14.1:r3:*:*:*:*:*:*",
"matchCriteriaId": "0CA10003-D52B-4110-9D7A-F50895E6BA17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:14.1:r4:*:*:*:*:*:*",
"matchCriteriaId": "1B2D843A-8ADE-4888-8960-B48394DEA1D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:14.1:r5:*:*:*:*:*:*",
"matchCriteriaId": "3BE66516-A06D-4C0F-8346-DFC8865C8FE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:14.1:r6:*:*:*:*:*:*",
"matchCriteriaId": "EEBDFC9E-7753-42A8-A5C8-4D40D219F93A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:14.2:r1:*:*:*:*:*:*",
"matchCriteriaId": "79149AA0-17D1-4522-894F-C025F7A30FD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:14.2:r2:*:*:*:*:*:*",
"matchCriteriaId": "30726286-7CB1-4E5D-AE44-2B4D84795900",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:14.2:r3:*:*:*:*:*:*",
"matchCriteriaId": "33BE028F-2961-414A-9D42-C4861566C2DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:14.2:r4:*:*:*:*:*:*",
"matchCriteriaId": "E85AB30C-03FC-44DB-A8AA-B916A905CA66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:14.2:r5:*:*:*:*:*:*",
"matchCriteriaId": "D01CA25F-E1E1-4831-8561-D3B0300BF4A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*",
"matchCriteriaId": "1C56E6C3-BBB6-4853-91D9-99C7676D0CD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:15.1:f2-s1:*:*:*:*:*:*",
"matchCriteriaId": "AC196685-3B0C-4754-AE6A-6BE456CC6B52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:15.1:f2-s2:*:*:*:*:*:*",
"matchCriteriaId": "F0146AA9-C513-4871-A62A-52C9F40EB958",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:15.1:f2-s3:*:*:*:*:*:*",
"matchCriteriaId": "A18672EF-E33D-4ACE-BB0A-561812F502C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:15.1:f2-s4:*:*:*:*:*:*",
"matchCriteriaId": "CEF0E75F-831E-40B8-926D-B2E92A84E31B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:*",
"matchCriteriaId": "0E0ECBD8-3D66-49DA-A557-5695159F0C06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:*",
"matchCriteriaId": "0EAA2998-A0D6-4818-9E7C-25E8099403E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*",
"matchCriteriaId": "D0D3EA8F-4D30-4383-AF2F-0FB6D822D0F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*",
"matchCriteriaId": "0E6CD065-EC06-4846-BD2A-D3CA7866070F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:15.1x49:d10:*:*:*:*:*:*",
"matchCriteriaId": "D90D8985-34EF-44CC-A9A7-CB0FD22676F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:15.1x49:d20:*:*:*:*:*:*",
"matchCriteriaId": "18468579-0195-4DDE-BAA5-4BE4068F3A69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:juniper:junos:15.1x49:d35:*:*:*:*:*:*",
"matchCriteriaId": "870244F3-1C05-4F10-A205-5189BB860F46",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Juniper Junos OS before 12.1X46-D45, 12.1X46-D50, 12.1X47 before 12.1X47-D35, 12.3X48 before 12.3X48-D30, 13.3 before 13.3R9-S1, 14.1 before 14.1R7, 14.2 before 14.2R6, 15.1 before 15.1F2-S5, 15.1F4 before 15.1F4-S2, 15.1R before 15.1R2-S3, 15.1 before 15.1R3, and 15.1X49 before 15.1X49-D40 allow remote attackers to cause a denial of service (kernel crash) via a crafted UDP packet destined to the interface IP address of a 64-bit OS device."
},
{
"lang": "es",
"value": "Juniper Junos OS en versiones anteriores a 12.1X46-D45, 12.1X46-D50, 12.1X47 en versiones anteriores a 12.1X47-D35, 12.3X48 en versiones anteriores a 12.3X48-D30, 13.3 en versiones anteriores a 13.3R9-S1, 14.1 en versiones anteriores a 14.1R7, 14.2 en versiones anteriores a 14.2R6, 15.1 en versiones anteriores a 15.1F2-S5, 15.1F4 en versiones anteriores a 15.1F4-S2, 15.1R en versiones anteriores a 15.1R2-S3, 15.1 en versiones anteriores a 15.1R3 y 15.1X49 en versiones anteriores a 15.1X49-D40 permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de kernel) a trav\u00e9s de un paquete UDP manipulado destinado a la interfaz de la direcci\u00f3n IP de un dispositivo 64-bit OS."
}
],
"id": "CVE-2016-1263",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": true,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2016-09-09T14:05:00.203",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10758"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id/1036304"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10758"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1036304"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…