var-201309-0473
Vulnerability from variot
Junos Pulse Secure Access Service (IVE) 7.1 before 7.1r5, 7.2 before 7.2r10, 7.3 before 7.3r6, and 7.4 before 7.4r3 and Junos Pulse Access Control Service (UAC) 4.1 before 4.1r8.1, 4.2 before 4.2r5, 4.3 before 4.3r6 and 4.4 before 4.4r3, when a hardware SSL acceleration card is enabled, allows remote attackers to cause a denial of service (device hang) via a crafted packet. Attackers can exploit this issue to cause denial-of-service conditions. IVE is a simple, intuitive client. UAC is a standard-based, scalable network access control solution. A denial of service vulnerability exists in versions 7.1 to 7.4 of IVE devices and versions 4.1 to 4.4 of UAC devices
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201309-0473", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "junos pulse access control service", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "4.1" }, { "model": "junos pulse secure access service", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "7.1" }, { "model": "junos pulse access control service", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "4.3" }, { "model": "junos pulse secure access service", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "7.4" }, { "model": "junos pulse secure access service", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "7.2" }, { "model": "junos pulse access control service", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "4.2" }, { "model": "junos pulse secure access service", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "7.3" }, { "model": "junos pulse access control service", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "4.4" }, { "model": "junos pulse access control service", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "4.1r8.1" }, { "model": "junos pulse access control service", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "4.3" }, { "model": "junos pulse access control service", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "4.4r3" }, { "model": "junos pulse secure access service", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "7.2r10" }, { "model": "junos pulse access control service", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "4.4" }, { "model": "junos pulse access control service", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "4.3r6" }, { "model": "junos pulse access control service", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "4.1" }, { "model": "junos pulse secure access service", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "7.2" }, { "model": "junos pulse secure access service", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "7.3" }, { "model": "junos pulse secure access service", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "7.3r6" }, { "model": "junos pulse secure access service", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "7.4r3" }, { "model": "junos pulse access control service", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "4.2r5" }, { "model": "junos pulse secure access service", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "7.4" }, { "model": "junos pulse access control service", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "4.2" }, { "model": "junos pulse secure access service", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "7.1r5" }, { "model": "junos pulse secure access service", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "7.1" }, { "model": "networks sa6500 fips", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "0" }, { "model": "networks sa6000 fips", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "0" }, { "model": "networks ive os 7.1r1", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "networks ive os", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "7.1" } ], "sources": [ { "db": "BID", "id": "62354" }, { "db": "JVNDB", "id": "JVNDB-2013-004161" }, { "db": "CNNVD", "id": "CNNVD-201309-234" }, { "db": "NVD", "id": "CVE-2013-5650" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:juniper:junos_pulse_access_control_service", "vulnerable": true }, { "cpe22Uri": "cpe:/a:juniper:junos_pulse_secure_access_service", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-004161" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor credits Kenny Herold.", "sources": [ { "db": "BID", "id": "62354" } ], "trust": 0.3 }, "cve": "CVE-2013-5650", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 5.4, "confidentialityImpact": "NONE", "exploitabilityScore": 4.9, "id": "CVE-2013-5650", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 5.4, "confidentialityImpact": "NONE", "exploitabilityScore": 4.9, "id": "VHN-65652", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:H/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2013-5650", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2013-5650", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201309-234", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-65652", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-65652" }, { "db": "JVNDB", "id": "JVNDB-2013-004161" }, { "db": "CNNVD", "id": "CNNVD-201309-234" }, { "db": "NVD", "id": "CVE-2013-5650" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Junos Pulse Secure Access Service (IVE) 7.1 before 7.1r5, 7.2 before 7.2r10, 7.3 before 7.3r6, and 7.4 before 7.4r3 and Junos Pulse Access Control Service (UAC) 4.1 before 4.1r8.1, 4.2 before 4.2r5, 4.3 before 4.3r6 and 4.4 before 4.4r3, when a hardware SSL acceleration card is enabled, allows remote attackers to cause a denial of service (device hang) via a crafted packet. \nAttackers can exploit this issue to cause denial-of-service conditions. IVE is a simple, intuitive client. UAC is a standard-based, scalable network access control solution. A denial of service vulnerability exists in versions 7.1 to 7.4 of IVE devices and versions 4.1 to 4.4 of UAC devices", "sources": [ { "db": "NVD", "id": "CVE-2013-5650" }, { "db": "JVNDB", "id": "JVNDB-2013-004161" }, { "db": "BID", "id": "62354" }, { "db": "VULHUB", "id": "VHN-65652" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-5650", "trust": 2.8 }, { "db": "JUNIPER", "id": "JSA10590", "trust": 2.0 }, { "db": "SECUNIA", "id": "54776", "trust": 1.7 }, { "db": "OSVDB", "id": "97241", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2013-004161", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201309-234", "trust": 0.7 }, { "db": "BID", "id": "62354", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-65652", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-65652" }, { "db": "BID", "id": "62354" }, { "db": "JVNDB", "id": "JVNDB-2013-004161" }, { "db": "CNNVD", "id": "CNNVD-201309-234" }, { "db": "NVD", "id": "CVE-2013-5650" } ] }, "id": "VAR-201309-0473", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-65652" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:35:19.340000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "JSA10590", "trust": 0.8, "url": "https://kb.juniper.net/InfoCenter/index?cmid=no\u0026page=content\u0026id=JSA10590" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-004161" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-65652" }, { "db": "JVNDB", "id": "JVNDB-2013-004161" }, { "db": "NVD", "id": "CVE-2013-5650" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://kb.juniper.net/infocenter/index?cmid=no\u0026page=content\u0026id=jsa10590" }, { "trust": 1.7, "url": "http://secunia.com/advisories/54776" }, { "trust": 1.1, "url": "http://osvdb.org/97241" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/87063" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5650" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5650" }, { "trust": 0.3, "url": "http://www.juniper.net/" }, { "trust": 0.1, "url": "https://kb.juniper.net/infocenter/index?cmid=no\u0026amp;page=content\u0026amp;id=jsa10590" } ], "sources": [ { "db": "VULHUB", "id": "VHN-65652" }, { "db": "BID", "id": "62354" }, { "db": "JVNDB", "id": "JVNDB-2013-004161" }, { "db": "CNNVD", "id": "CNNVD-201309-234" }, { "db": "NVD", "id": "CVE-2013-5650" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-65652" }, { "db": "BID", "id": "62354" }, { "db": "JVNDB", "id": "JVNDB-2013-004161" }, { "db": "CNNVD", "id": "CNNVD-201309-234" }, { "db": "NVD", "id": "CVE-2013-5650" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-09-16T00:00:00", "db": "VULHUB", "id": "VHN-65652" }, { "date": "2013-09-12T00:00:00", "db": "BID", "id": "62354" }, { "date": "2013-09-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-004161" }, { "date": "2013-09-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201309-234" }, { "date": "2013-09-16T19:14:39.367000", "db": "NVD", "id": "CVE-2013-5650" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-08-29T00:00:00", "db": "VULHUB", "id": "VHN-65652" }, { "date": "2013-09-12T00:00:00", "db": "BID", "id": "62354" }, { "date": "2013-09-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-004161" }, { "date": "2013-09-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201309-234" }, { "date": "2024-11-21T01:57:52.937000", "db": "NVD", "id": "CVE-2013-5650" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201309-234" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Juniper Junos Pulse Secure Access Service and Junos Pulse Access Control Service Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-004161" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201309-234" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…