fkie_cve-2016-1270
Vulnerability from fkie_nvd
Published
2016-04-15 14:59
Modified
2025-04-12 10:46
Severity ?
Summary
The rpd daemon in Juniper Junos OS before 12.1X44-D60, 12.1X46 before 12.1X46-D45, 12.1X47 before 12.1X47-D30, 12.3 before 12.3R9, 12.3X48 before 12.3X48-D20, 13.2 before 13.2R7, 13.2X51 before 13.2X51-D40, 13.3 before 13.3R6, 14.1 before 14.1R4, and 14.2 before 14.2R2, when configured with BGP-based L2VPN or VPLS, allows remote attackers to cause a denial of service (daemon restart) via a crafted L2VPN family BGP update.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:juniper:junos:*:d55:*:*:*:*:*:*", "matchCriteriaId": "A09A1666-F215-40C4-A32D-AA2F7158036F", "versionEndIncluding": "12.1x44", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.1x46:*:*:*:*:*:*:*", "matchCriteriaId": "CFB89F64-16BB-4A14-9084-B338668D7FF1", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.1x46:d10:*:*:*:*:*:*", "matchCriteriaId": "A71742CF-50B1-44BB-AB7B-27E5DCC9CF70", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.1x46:d15:*:*:*:*:*:*", "matchCriteriaId": "4FD4237A-C257-4D8A-ABC4-9B2160530A4E", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.1x46:d20:*:*:*:*:*:*", "matchCriteriaId": "5A449C87-C5C3-48FE-9E46-64ED5DD5F193", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.1x46:d25:*:*:*:*:*:*", "matchCriteriaId": "F4B6215F-76BF-473F-B325-0975B0EB101E", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.1x46:d30:*:*:*:*:*:*", "matchCriteriaId": "A1C4A10C-49A3-4103-9E56-F881113BC5D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.1x46:d35:*:*:*:*:*:*", "matchCriteriaId": "50E7FD07-A309-48EC-A520-C7F0FA35865C", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.1x46:d40:*:*:*:*:*:*", "matchCriteriaId": "F868948A-04D7-473B-971F-721302653633", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.1x47:*:*:*:*:*:*:*", "matchCriteriaId": "0BB3DE56-1B04-4A53-B4A4-93286FC98463", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.1x47:d10:*:*:*:*:*:*", "matchCriteriaId": "181C0D30-4476-48EE-A4A4-3B2461F4AC20", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.1x47:d15:*:*:*:*:*:*", "matchCriteriaId": "63F559A2-2744-4771-9420-C70AA87496A2", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.1x47:d20:*:*:*:*:*:*", "matchCriteriaId": "040A6307-236E-4FAA-9A74-676F1DB0CF17", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.1x47:d25:*:*:*:*:*:*", "matchCriteriaId": "350A0F1E-1057-4A8E-AB0B-7615B3877858", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "8E014A0D-0054-4EBA-BA1F-035B74BD822F", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.3:r1:*:*:*:*:*:*", "matchCriteriaId": "371A7DF8-3F4B-439D-8990-D1BC6F0C25C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.3:r2:*:*:*:*:*:*", "matchCriteriaId": "7CC3BCFD-2B0F-4994-9FE4-9D37FA85F1E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.3:r3:*:*:*:*:*:*", "matchCriteriaId": "C6F309FD-0A5A-4C86-B227-B2B511A5CEB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.3:r4:*:*:*:*:*:*", "matchCriteriaId": "960059B5-0701-4B75-AB51-0A430247D9F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.3:r5:*:*:*:*:*:*", "matchCriteriaId": "1D1DCA52-DA81-495B-B516-5571F01E3B0A", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.3:r6:*:*:*:*:*:*", "matchCriteriaId": "05E187F6-BACD-4DD5-B393-B2FE4349053A", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.3:r7:*:*:*:*:*:*", "matchCriteriaId": "3C240840-A6BC-4E3D-A60D-22F08E67E2B2", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.3:r8:*:*:*:*:*:*", "matchCriteriaId": "CC90563F-6BCB-4D77-8FD4-584E3A6C7741", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.3x48:d10:*:*:*:*:*:*", "matchCriteriaId": "4B7066A4-CD05-4E1A-89E8-71B4CB92CFF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:12.3x48:d15:*:*:*:*:*:*", "matchCriteriaId": "A4AC2E1E-74FB-4DA3-8292-B2079F83FF54", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.2:*:*:*:*:*:*:*", "matchCriteriaId": "CAB7D840-9469-4CE2-8DBF-017A44741374", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.2:r1:*:*:*:*:*:*", "matchCriteriaId": "D3A0A607-7D3C-4F2A-B5F5-576A70649CB1", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.2:r2:*:*:*:*:*:*", "matchCriteriaId": "32E9620A-7C0A-474C-919E-13609FFE580D", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.2:r3:*:*:*:*:*:*", "matchCriteriaId": "672D3A38-92B4-4F33-82A6-B2D3F3403AF3", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.2:r4:*:*:*:*:*:*", "matchCriteriaId": "F5C24441-6E9D-4EF7-8903-A109A52340C0", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.2:r5:*:*:*:*:*:*", "matchCriteriaId": "7CB98C4F-617F-4F51-A86E-D1EBE2BDE583", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.2:r6:*:*:*:*:*:*", "matchCriteriaId": "A24E3EA6-810D-4885-8BE5-8A70E61E7589", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.2x51:d15:*:*:*:*:*:*", "matchCriteriaId": "3947A516-2054-48B3-ADFD-3CF88EC2288D", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.2x51:d20:*:*:*:*:*:*", "matchCriteriaId": "D0951235-4A0A-4200-A7B1-9FF4540A3755", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.2x51:d21:*:*:*:*:*:*", "matchCriteriaId": "9E3A9AB1-202A-4480-8FFD-872C79325854", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.2x51:d25:*:*:*:*:*:*", "matchCriteriaId": "7478F581-8A89-49D7-B9F9-E0E90BEEAEE0", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.2x51:d26:*:*:*:*:*:*", "matchCriteriaId": "28B80348-B130-4178-BFD9-4AE390E139D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.2x51:d30:*:*:*:*:*:*", "matchCriteriaId": "D1EE6518-C224-4019-8393-85893AC29898", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.2x51:d35:*:*:*:*:*:*", "matchCriteriaId": "718A304D-1DBD-4BC1-B038-2BD4755E8793", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.3:*:*:*:*:*:*:*", "matchCriteriaId": "E4AF5DAA-62F5-491F-A9CE-098970671D43", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.3:r1:*:*:*:*:*:*", "matchCriteriaId": "3FF9FF91-9184-4D18-8288-9110E35F4AE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.3:r2:*:*:*:*:*:*", "matchCriteriaId": "0F2E537B-9504-4912-B231-0D83F4459469", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.3:r3:*:*:*:*:*:*", "matchCriteriaId": "4BCB3837-DCBC-4997-B63E-E47957584709", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.3:r4:*:*:*:*:*:*", "matchCriteriaId": "6C88E2B1-469B-442B-9FC0-7C9408CE3917", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.3:r5:*:*:*:*:*:*", "matchCriteriaId": "1FB5A368-E582-4DFD-87B4-C887DA908E47", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:13.3:r6:*:*:*:*:*:*", "matchCriteriaId": "70ED0B93-2CFC-474F-B199-F78E1C67E8C7", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:14.1:*:*:*:*:*:*:*", "matchCriteriaId": "6237291A-B861-4D53-B7AA-C53A44B76896", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:14.1:r1:*:*:*:*:*:*", "matchCriteriaId": "9C778627-820A-48F5-9680-0205D6DB5EB6", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:14.1:r2:*:*:*:*:*:*", "matchCriteriaId": "FA7F03DC-73A2-4760-B386-2A57E9C97E65", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:14.1:r3:*:*:*:*:*:*", "matchCriteriaId": "0CA10003-D52B-4110-9D7A-F50895E6BA17", "vulnerable": true }, { "criteria": "cpe:2.3:o:juniper:junos:14.2:r1:*:*:*:*:*:*", "matchCriteriaId": "79149AA0-17D1-4522-894F-C025F7A30FD7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The rpd daemon in Juniper Junos OS before 12.1X44-D60, 12.1X46 before 12.1X46-D45, 12.1X47 before 12.1X47-D30, 12.3 before 12.3R9, 12.3X48 before 12.3X48-D20, 13.2 before 13.2R7, 13.2X51 before 13.2X51-D40, 13.3 before 13.3R6, 14.1 before 14.1R4, and 14.2 before 14.2R2, when configured with BGP-based L2VPN or VPLS, allows remote attackers to cause a denial of service (daemon restart) via a crafted L2VPN family BGP update." }, { "lang": "es", "value": "El demonio rpd en Juniper Junos OS en versiones anteriores a 12.1X44-D60, 12.1X46 en versiones anteriores a 12.1X46-D45, 12.1X47 en versiones anteriores a 12.1X47-D30, 12.3 en versiones anteriores a 12.3R9, 12.3X48 en versiones anteriores a 12.3X48-D20, 13.2 en versiones anteriores a 13.2R7, 13.2X51 en versiones anteriores a 13.2X51-D40, 13.3 en versiones anteriores a 13.3R6, 14.1 en versiones anteriores a 14.1R4 y 14.2 en versiones anteriores a 14.2R2, cuando se configura con BGP-based L2VPN o VPLS, permite a atacantes remotos provocar una deneagci\u00f3n de servicio (reinicio de demonio) a trav\u00e9s de una actualizaci\u00f3n de la familia L2VPN BGP manipulada." } ], "id": "CVE-2016-1270", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-04-15T14:59:06.130", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10737" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10737" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-19" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…