Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2020-04549

Опубликовано: 08 апр. 2020
Источник: fstec
CVSS3: 7.5
CVSS2: 7.8
EPSS Низкий

Описание

Уязвимость операционной системы JunOS связана с некорректной инициализацией ресурса. Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, вызвать отказ в обслуживании

Вендор

Juniper Networks Inc.

Наименование ПО

JunOS

Версия ПО

до 17.4R2-S9 (JunOS)
до 17.4R2-S9 (JunOS)
до 17.4R2-S9 (JunOS)
до 17.4R3 (JunOS)
до 17.4R3 (JunOS)
до 17.4R3 (JunOS)
до 18.1R3-S9 (JunOS)
до 18.1R3-S9 (JunOS)
до 18.1R3-S9 (JunOS)
до 18.2X75-D12 (JunOS)
до 18.2X75-D12 (JunOS)
до 18.2X75-D12 (JunOS)
до 18.2X75-D30 (JunOS)
до 18.2X75-D30 (JunOS)
до 18.2X75-D30 (JunOS)
до 18.2R3 (JunOS)
до 18.2R3 (JunOS)
до 18.2R3 (JunOS)
до 18.3R3 (JunOS)
до 18.3R3 (JunOS)
до 18.3R3 (JunOS)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

Juniper Networks Inc. JunOS до 17.4R2-S9
Juniper Networks Inc. JunOS до 17.4R2-S9
Juniper Networks Inc. JunOS до 17.4R2-S9
Juniper Networks Inc. JunOS до 17.4R3
Juniper Networks Inc. JunOS до 17.4R3
Juniper Networks Inc. JunOS до 17.4R3
Juniper Networks Inc. JunOS до 18.1R3-S9
Juniper Networks Inc. JunOS до 18.1R3-S9
Juniper Networks Inc. JunOS до 18.1R3-S9
Juniper Networks Inc. JunOS до 18.2X75-D12
Juniper Networks Inc. JunOS до 18.2X75-D12
Juniper Networks Inc. JunOS до 18.2X75-D12
Juniper Networks Inc. JunOS до 18.2X75-D30
Juniper Networks Inc. JunOS до 18.2X75-D30
Juniper Networks Inc. JunOS до 18.2X75-D30
Juniper Networks Inc. JunOS до 18.2R3
Juniper Networks Inc. JunOS до 18.2R3
Juniper Networks Inc. JunOS до 18.2R3
Juniper Networks Inc. JunOS до 18.3R3
Juniper Networks Inc. JunOS до 18.3R3
Juniper Networks Inc. JunOS до 18.3R3

Уровень опасности уязвимости

Высокий уровень опасности (базовая оценка CVSS 2.0 составляет 7,8)
Высокий уровень опасности (базовая оценка CVSS 3.0 составляет 7,5)

Возможные меры по устранению уязвимости

Использование рекомендаций:
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11000&actp=METADATA

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 71%
0.0066
Низкий

7.5 High

CVSS3

7.8 High

CVSS2

Связанные уязвимости

CVSS3: 7.5
nvd
почти 6 лет назад

This issue occurs on Juniper Networks Junos OS devices which do not support Advanced Forwarding Interface (AFI) / Advanced Forwarding Toolkit (AFT). Devices using AFI and AFT are not exploitable to this issue. An improper initialization of memory in the packet forwarding architecture in Juniper Networks Junos OS non-AFI/AFT platforms which may lead to a Denial of Service (DoS) vulnerability being exploited when a genuine packet is received and inspected by non-AFT/AFI sFlow and when the device is also configured with firewall policers. This first genuine packet received and inspected by sampled flow (sFlow) through a specific firewall policer will cause the device to reboot. After the reboot has completed, if the device receives and sFlow inspects another genuine packet seen through a specific firewall policer, the device will generate a core file and reboot. Continued inspection of these genuine packets will create an extended Denial of Service (DoS) condition. Depending on the method

github
больше 3 лет назад

This issue occurs on Juniper Networks Junos OS devices which do not support Advanced Forwarding Interface (AFI) / Advanced Forwarding Toolkit (AFT). Devices using AFI and AFT are not exploitable to this issue. An improper initialization of memory in the packet forwarding architecture in Juniper Networks Junos OS non-AFI/AFT platforms which may lead to a Denial of Service (DoS) vulnerability being exploited when a genuine packet is received and inspected by non-AFT/AFI sFlow and when the device is also configured with firewall policers. This first genuine packet received and inspected by sampled flow (sFlow) through a specific firewall policer will cause the device to reboot. After the reboot has completed, if the device receives and sFlow inspects another genuine packet seen through a specific firewall policer, the device will generate a core file and reboot. Continued inspection of these genuine packets will create an extended Denial of Service (DoS) condition. Depending on the met...

EPSS

Процентиль: 71%
0.0066
Низкий

7.5 High

CVSS3

7.8 High

CVSS2