var-201704-0734
Vulnerability from variot
Juniper Networks devices running affected Junos OS versions may be impacted by the receipt of a crafted BGP UPDATE which can lead to an rpd (routing process daemon) crash and restart. Repeated crashes of the rpd daemon can result in an extended denial of service condition. The affected Junos OS versions are: 15.1 prior to 15.1F2-S15, 15.1F5-S7, 15.1F6-S5, 15.1F7, 15.1R4-S7, 15.1R5-S2, 15.1R6; 15.1X49 prior to 15.1X49-D78, 15.1X49-D80; 15.1X53 prior to 15.1X53-D230, 15.1X53-D63, 15.1X53-D70; 16.1 prior to 16.1R3-S3, 16.1R4; 16.2 prior to 16.2R1-S3, 16.2R2; Releases prior to Junos OS 15.1 are unaffected by this vulnerability. 17.1R1, 17.2R1, and all subsequent releases have a resolution for this vulnerability. Juniper Networks Works with device products Junos OS Contains an input validation vulnerability.Service operation interruption (DoS) An attack may be carried out. Juniper Junos is prone to a denial-of-service vulnerability. Attackers can exploit this issue to crash and restart the affected device, denying service to legitimate users. Junos OS in Juniper Networks devices has a security vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201704-0734", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "junos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "16.1" }, { "model": "junos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "16.2" }, { "model": "junos", "scope": "eq", "trust": 1.6, "vendor": "juniper", "version": "15.1" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "15.1x49" }, { "model": "junos", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": "15.1x53" }, { "model": "junos os", "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "junos os", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "15.1" }, { "model": "junos os 17.2r1", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos os 17.1r1", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos os 16.2r2", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos os 16.2r1-s3", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos os 16.2r1", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos os 16.1r4", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos os 16.1r3-s3", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos os 16.1r2", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos os 16.1r1", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos os 15.1x53-d70", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos os 15.1x53-d63", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos os 15.1x53-d230", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos os 15.1x49-d80", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos os 15.1x49-d78", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos os 15.1r6", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos os 15.1r5-s2", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos os 15.1r4-s7", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos os 15.1f7", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos os 15.1f6-s5", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos os 15.1f5-s7", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos os 15.1f2-s15", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null } ], "sources": [ { "db": "BID", "id": "97606" }, { "db": "JVNDB", "id": "JVNDB-2017-003625" }, { "db": "CNNVD", "id": "CNNVD-201704-990" }, { "db": "NVD", "id": "CVE-2017-2313" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:juniper:junos", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-003625" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "97606" } ], "trust": 0.3 }, "cve": "CVE-2017-2313", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2017-2313", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-110516", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2017-2313", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-2313", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2017-2313", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201704-990", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-110516", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-110516" }, { "db": "JVNDB", "id": "JVNDB-2017-003625" }, { "db": "CNNVD", "id": "CNNVD-201704-990" }, { "db": "NVD", "id": "CVE-2017-2313" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Juniper Networks devices running affected Junos OS versions may be impacted by the receipt of a crafted BGP UPDATE which can lead to an rpd (routing process daemon) crash and restart. Repeated crashes of the rpd daemon can result in an extended denial of service condition. The affected Junos OS versions are: 15.1 prior to 15.1F2-S15, 15.1F5-S7, 15.1F6-S5, 15.1F7, 15.1R4-S7, 15.1R5-S2, 15.1R6; 15.1X49 prior to 15.1X49-D78, 15.1X49-D80; 15.1X53 prior to 15.1X53-D230, 15.1X53-D63, 15.1X53-D70; 16.1 prior to 16.1R3-S3, 16.1R4; 16.2 prior to 16.2R1-S3, 16.2R2; Releases prior to Junos OS 15.1 are unaffected by this vulnerability. 17.1R1, 17.2R1, and all subsequent releases have a resolution for this vulnerability. Juniper Networks Works with device products Junos OS Contains an input validation vulnerability.Service operation interruption (DoS) An attack may be carried out. Juniper Junos is prone to a denial-of-service vulnerability. \nAttackers can exploit this issue to crash and restart the affected device, denying service to legitimate users. Junos OS in Juniper Networks devices has a security vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2017-2313" }, { "db": "JVNDB", "id": "JVNDB-2017-003625" }, { "db": "BID", "id": "97606" }, { "db": "VULHUB", "id": "VHN-110516" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-2313", "trust": 2.8 }, { "db": "JUNIPER", "id": "JSA10778", "trust": 2.0 }, { "db": "BID", "id": "97606", "trust": 2.0 }, { "db": "SECTRACK", "id": "1038257", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2017-003625", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201704-990", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-110516", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-110516" }, { "db": "BID", "id": "97606" }, { "db": "JVNDB", "id": "JVNDB-2017-003625" }, { "db": "CNNVD", "id": "CNNVD-201704-990" }, { "db": "NVD", "id": "CVE-2017-2313" } ] }, "id": "VAR-201704-0734", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-110516" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:49:06.976000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "JSA10778", "trust": 0.8, "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10778\u0026actp=METADATA" }, { "title": "Juniper Junos Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=69415" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-003625" }, { "db": "CNNVD", "id": "CNNVD-201704-990" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-110516" }, { "db": "JVNDB", "id": "JVNDB-2017-003625" }, { "db": "NVD", "id": "CVE-2017-2313" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/bid/97606" }, { "trust": 1.7, "url": "https://kb.juniper.net/jsa10778" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1038257" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2313" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2313" }, { "trust": 0.3, "url": "http://www.juniper.net/" }, { "trust": 0.3, "url": "http://www.juniper.net/us/en/products-services/nos/junos/" }, { "trust": 0.3, "url": "https://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10778\u0026cat=sirt_1\u0026actp=list" } ], "sources": [ { "db": "VULHUB", "id": "VHN-110516" }, { "db": "BID", "id": "97606" }, { "db": "JVNDB", "id": "JVNDB-2017-003625" }, { "db": "CNNVD", "id": "CNNVD-201704-990" }, { "db": "NVD", "id": "CVE-2017-2313" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-110516" }, { "db": "BID", "id": "97606" }, { "db": "JVNDB", "id": "JVNDB-2017-003625" }, { "db": "CNNVD", "id": "CNNVD-201704-990" }, { "db": "NVD", "id": "CVE-2017-2313" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-04-24T00:00:00", "db": "VULHUB", "id": "VHN-110516" }, { "date": "2017-04-12T00:00:00", "db": "BID", "id": "97606" }, { "date": "2017-05-31T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-003625" }, { "date": "2017-04-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201704-990" }, { "date": "2017-04-24T15:59:00.207000", "db": "NVD", "id": "CVE-2017-2313" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-11T00:00:00", "db": "VULHUB", "id": "VHN-110516" }, { "date": "2017-04-18T01:05:00", "db": "BID", "id": "97606" }, { "date": "2017-05-31T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-003625" }, { "date": "2017-04-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201704-990" }, { "date": "2024-11-21T03:23:15.867000", "db": "NVD", "id": "CVE-2017-2313" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201704-990" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Juniper Networks Works with device products Junos OS Input validation vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-003625" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201704-990" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.