Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2020-05750

Опубликовано: 14 окт. 2020
Источник: fstec
CVSS3: 8.3
CVSS2: 7.5
EPSS Низкий

Описание

Уязвимость реализации процесса Multiservices PIC Management Daemon (mspmand) операционной системы Junos вызвана ошибками синхронизации при использовании общего ресурса. Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, вызвать расширенную атаку типа «отказ в обслуживании»

Вендор

Juniper Networks Inc.

Наименование ПО

JunOS

Версия ПО

до 18.3R3-S1 (JunOS)
до 18.4R3 (JunOS)
до 19.1R3 (JunOS)
до 19.2R2 (JunOS)
до 19.3R3 (JunOS)
до 17.3R3-S8 (JunOS)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

Juniper Networks Inc. JunOS до 18.3R3-S1
Juniper Networks Inc. JunOS до 18.4R3
Juniper Networks Inc. JunOS до 19.1R3
Juniper Networks Inc. JunOS до 19.2R2
Juniper Networks Inc. JunOS до 19.3R3
Juniper Networks Inc. JunOS до 17.3R3-S8

Уровень опасности уязвимости

Высокий уровень опасности (базовая оценка CVSS 2.0 составляет 7,5)
Высокий уровень опасности (базовая оценка CVSS 3.0 составляет 8,3)

Возможные меры по устранению уязвимости

Использование рекомендаций производителя:
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA11054&cat=SIRT_1&actp=LIST

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 52%
0.00287
Низкий

8.3 High

CVSS3

7.5 High

CVSS2

Связанные уязвимости

CVSS3: 8.3
nvd
больше 5 лет назад

When DNS filtering is enabled on Juniper Networks Junos MX Series with one of the following cards MS-PIC, MS-MIC or MS-MPC, an incoming stream of packets processed by the Multiservices PIC Management Daemon (mspmand) process, responsible for managing "URL Filtering service", may crash, causing the Services PIC to restart. While the Services PIC is restarting, all PIC services including DNS filtering service (DNS sink holing) will be bypassed until the Services PIC completes its boot process. This vulnerability might allow an attacker to cause an extended Denial of Service (DoS) attack against the device and to cause clients to be vulnerable to DNS based attacks by malicious DNS servers when they send DNS requests through the device. As a result, devices which were once protected by the DNS Filtering service are no longer protected and at risk of exploitation. This issue affects Juniper Networks Junos OS: 17.3 versions prior to 17.3R3-S8; 18.3 versions prior to 18.3R3-S1; 18.4 versions

github
больше 3 лет назад

When DNS filtering is enabled on Juniper Networks Junos MX Series with one of the following cards MS-PIC, MS-MIC or MS-MPC, an incoming stream of packets processed by the Multiservices PIC Management Daemon (mspmand) process, responsible for managing "URL Filtering service", may crash, causing the Services PIC to restart. While the Services PIC is restarting, all PIC services including DNS filtering service (DNS sink holing) will be bypassed until the Services PIC completes its boot process. This vulnerability might allow an attacker to cause an extended Denial of Service (DoS) attack against the device and to cause clients to be vulnerable to DNS based attacks by malicious DNS servers when they send DNS requests through the device. As a result, devices which were once protected by the DNS Filtering service are no longer protected and at risk of exploitation. This issue affects Juniper Networks Junos OS: 17.3 versions prior to 17.3R3-S8; 18.3 versions prior to 18.3R3-S1; 18.4 versio...

EPSS

Процентиль: 52%
0.00287
Низкий

8.3 High

CVSS3

7.5 High

CVSS2